354 Lotus blogs updated hourly. Who will post next? Home | Downloads | Events | Pods | Blogs | Search | myPL | About 
 
Latest 7 Posts
Alarmingly Low Rate of Employees Receive Security Awareness Training
Wed, Apr 23rd 2014 14
How to Mend a Broken Heart: The Heartbleed Bug and what you need to know to protect yourself
Fri, Apr 11th 2014 146
Are You Only a Hacktivists Away from Chaos?
Wed, Apr 2nd 2014 79
Ransomed Beauty: Is Your Identity Being Held for Ransom?
Thu, Mar 27th 2014 63
Two More Colleges Exposed: Indiana University and North Dakota University
Fri, Mar 7th 2014 154
Price vs Cost: One Man’s Opinion
Mon, Mar 3rd 2014 172
Hackstorm
Wed, Feb 26th 2014 174
Top 10
World’s Largest Beverage Company Compromised
Thu, Jan 30th 2014 348
Knock Down the Barriers: What Does Two-factor Authentication Solution Need to Have?
Tue, Mar 26th 2013 287
Data Breach on Campus: Over 300,000 Exposed at University of Maryland
Fri, Feb 21st 2014 189
Hacking Your Way to Love
Thu, Jan 23rd 2014 182
Bugged- A Glitch in Google Voice Recognition
Fri, Jan 31st 2014 176
To E-File or Not to E-File
Mon, Feb 10th 2014 174
Hackstorm
Wed, Feb 26th 2014 174
Price vs Cost: One Man’s Opinion
Mon, Mar 3rd 2014 172
The N.S.A. Gets Crafty
Thu, Jan 16th 2014 163
Identifying Authentication Challenges in Education: A look within our clients
Wed, Jan 22nd 2014 158


The Data Breach Blog – An Excellent Resource
Chief Content Writer    

We have been including blog posts related to security breaches throughout the year and I wanted to share with you a great resource from SCMagazine called The Data Breach Blog. This is a blog dedicated to reporting on various data breaches which have occurred and providing information such as how many victims, what happened, what type of personal data, what was the response, and details about issues which allowed the data breach to happen.

One example is this recent data breach of a database containing personal information from 235,000 students, former students, parents, faculty, staff and individuals who sent their SAT scores to Western Connecticut State University. This included names, social security numbers, emails, addresses, phone numbers and even grades.  Check out the rest of the blog post to see how they handled the attack….

###

The PortalGuard software is an authentication platform which is focused on enhancing usability, while maintaining a balance between security, auditing, and compliance for your web and desktop authentication requirements. PortalGuard provides capabilities including multi-factor authentication, transparent user authentication,  self-service password management, two-factor authentication, password synchronization and single sign-on which can be seamlessly configured by user, group, or application.

http://www.PortalGuard.com

Subscribe to our newsletter: http://portalguard.com/contact_us.php

https://twitter.com/portalguard

http://pinterest.com/pistolstar/portalguard

http://www.facebook.com/pistolstar.authentication

http://www.facebook.com/pages/PortalGuard/240761992635169



---------------------
http://blog.pistolstar.us/blog/the-data-breach-blog-an-excellent-resource/
Dec 12, 2012
50 hits



Recent Blog Posts
14


Alarmingly Low Rate of Employees Receive Security Awareness Training
Wed, Apr 23rd 2014 11:11a   Rob Bellefeuille
With the state of the economy, it is not too shocking that only 43% of employees receive security awareness training. Many companies have been faced with reducing their workforce and running “leaner and meaner,” thus devoting all hours of the workday to improving the companies bottom-line. It is hard to believe that such an important element has gone the way of the Dodo bird. One would think that more time would be dedicated to security training given the recent and highly publicized securit [read] Keywords: best practice email enterprise mobile password security
146


How to Mend a Broken Heart: The Heartbleed Bug and what you need to know to protect yourself
Fri, Apr 11th 2014 9:12a   Rob Bellefeuille
The news broke this week that the Heartbleed Bug had attacked an undetermined amount of websites and their users worldwide. At this time it would seem that a large number of people are affected, however, the magnitude of this Bug may not be made clear for some time. Last year, the Adobe breach  numbers grew drastically as time moved forward. So what is the Heartbleed Bug? The researchers who uncovered the problem describe the Bug as a serious flaw within OpenSSL. “The Heartbleed Bug is a seri [read] Keywords: applications bug email instant messaging password security xml
79


Are You Only a Hacktivists Away from Chaos?
Wed, Apr 2nd 2014 2:11p   Liana Lichtenwalner
Data security is a hot topic right now with Target, Michaels, and other large companies reporting data breaches. After all the time, money, and publicity from the breaches, I am sure they wish they could turn back time and deploy a stronger authentication to guard against the black market hacktivists that caused the chaos. In Cameron Shilling’s article “Is Your Business a Data Breach Away from Disaster?,” Shilling states, “data security breaches are not just perpetrated by Internet hac [read] Keywords: security
63


Ransomed Beauty: Is Your Identity Being Held for Ransom?
Thu, Mar 27th 2014 4:11p   Liana Lichtenwalner
As a woman, I know all too well how much time and money we spend on beauty supplies. Whether buying the “next best thing” in the cosmetic department or trying the newest home remedy from your favorite blog, it all requires you to spend some cash or use a credit/debit card. But how much are you willing to pay: ten, twenty, fifty dollars? What about your identity? With the growing number of businesses reporting breaches in their databases, it is no surprise that Sally Beauty became a target to [read] Keywords: network
154


Two More Colleges Exposed: Indiana University and North Dakota University
Fri, Mar 7th 2014 2:12p   Rob Bellefeuille
There seems to be a rise lately in the number of campuses that are being subject to data breaches. Today it was brought to light that North Dakota University’s database was compromised exposing around 300K current and former student’s information along with some of their staff as well. Last week, Indiana University informed nearly 146,000 recent graduates and students that their seven-campus data system had accidentally exposed. This news comes on the heels of the recent University of Maryla [read] Keywords: applications database network password security server
172


Price vs Cost: One Man’s Opinion
Mon, Mar 3rd 2014 3:14p   Rob Bellefeuille
With the economic state of the country, you always hear folks talking about the price of an item or how much it cost them. Being in the security industry and a home owner, I can identify with the struggles that come with sticking to a budget and finding a solution. However, with security it can truly be a gamble that all too often plays out in a negative way. One comparison we threw around a lot here in the office is a home security system. You constantly see on the news or hear from others sto [read] Keywords: office security xml




174


Hackstorm
Wed, Feb 26th 2014 10:15a   Liana Lichtenwalner
Hailstorms are a threatening phenomenon that can sometimes turn fatal. Hailstones can range from a ¼ of an inch to 7 inches in size, causing severe damage to anything in their path. Attacking hackers, in many ways, are like hailstorms when there is a breach in security, leaving extensive damage. Lately, Cyber security has been on the minds of many people, and with many security breaches at major companies placing personal data at risk, it is no wonder. A recent study done by the Ponemon Insti [read] Keywords: application integration network security
189


Data Breach on Campus: Over 300,000 Exposed at University of Maryland
Fri, Feb 21st 2014 12:14p   Rob Bellefeuille
This week the University of Maryland came forth with an announcement that their campus data base had been breached, exposing sensitive information for over 300,000 students and faculty.  The data breach comes on the heels of many other similar data breaches at retailers across the US including Target, Neaman Marcus, and Michaels Craft Stores. According to a letter from University of Maryland President, Wallace D. Loh on February 19, 2014; “A specific database of records maintained by our IT D [read] Keywords: database password security xml
139


Government Surveillance, Time to Reform?
Mon, Feb 17th 2014 11:11a   Chief Content Writer
There has been a recent push back against the government claiming that they are impeding on the privacy rights of users. Eight companies, including AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo, co-authored a letter to President Obama stating their concerns. In this letter, the major companies broached the issue of the global interference with users’ internet accounts and discussed the fact that governments do indeed need to protect their citizens but not at the cost of [read] Keywords: apple facebook google linkedin microsoft security twitter wiki xml
174


To E-File or Not to E-File
Mon, Feb 10th 2014 1:11p   Liana Lichtenwalner
While Shakespeare is better known as an excellent playwright, vivacious actor, and sublime constructor of the English language, he also has a not-so-well-known, historical record for tax evasion, hoarding, and the selling of grain at atrocious prices during years of famine. Although we are not here to discuss the moral ethics of Shakespeare, we should ask ourselves “to e-file or not to e-file.”  As the season for filing your taxes approaches and with many already waiting for their returns, [read] Keywords: policies application network password security wireless xml




Created and Maintained by Yancy Lent - About - Blog Submission - Suggestions - Change Log - Blog Widget - Advertising - Mobile Edition