Tag Archives: Data Security




From Eric Levy: ITAD Sales, EPC, Inc. EPC, Inc, now in it’s 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect companies reputation and information. A recent article from […]









Research in Motion just cannot catch a break with their tablet, the Playbook. Not only are sales lagging behind Apple and Android offerings, forcing RIM to cut pricing to $299; but now security researchers have discovered email and other personal information could be stolen via malware. The security weakness is exploited using Playbook Bridge, a […]









It sounds like a plot out of one of a summer spy movie, but security researcher Thomas Ryan tested what would happen when posting a fake profile of a real-life Abby Scuito. The results? Over 300 “friends” in the military, information security, and intelligence fields, a few job offers, and invitations to security conferences.














How many passwords do you have? According to a study done by the NTA Monitor in 2002 the average computer user has 21 different passworded accounts. Twenty One! And that was before Facebook, Twitter, or any other social networking tool. I personally have well over 100 distinct account credentials on various websites and servers. It’s […]









There were some great articles on CIO.com this week relating to Data Security. Here they are plus a selection of the best IT Data Security articles in the last week: Heartland CEO: QSAs Let Us Down In the review of what led to the Heartland credit card breach, Heartland’s CEO Robert Carr points to the […]









Imagine it, you purchased a computer on eBay, plug it in, and find top secret missle defense secrets. What would you do? This is the situation a research group at Longwood University found themselves in after purchasing a used hard drive from the popular auction site. This hard drive reportedly contained files from Lockheed Martin, […]









Buried within the huge American Recovery and Reinvestment Act (a.k.a, the “Stimulus Bill”) are a few changes to HIPAA’s Privacy and Security Rules, increasing the scope of coverage to include Business Associates. This means data security providers, contractors, and partners can be directly fined for informational security breaches that occur on their watch. The bill […]