Archive for the ‘Brian McGinley’ Category

By Brian McGinley

In the spirit of the Olympic Games under way this summer in London, we’ve opted to award gold, silver and bronze medals to companies and government institutions for their performance in the 2012 (In)Security Games.

Find out which organizations experienced the thrill of a well-designed privacy plan and which ones endured the agony of an easily prevented data breach. The goal is simple. We want organizations to get smarter about data security to better protect consumers’ personally identifiable information.

(more…)

By

VeriSign Inc., the company responsible for assuring that more than half the world’s websites are authentic, was hacked multiple times in 2010, and the thieves succeeded in stealing information.

The company is one of the major pillars of the Internet, responsible for assuring the authenticity of all websites that end in .com, .gov and .net. VeriSign also processes up to 50 billion web queries a day, defends companies’ websites against cyber attacks, and tracks international hackers.

(more…)

By Brian McGinley,

We have moved from being a computer-assisted society to one that is computer-dependent. Controlling that dependence is critical to maintaining a secure operation. Admittedly, that requires assistance from technical experts. But good control begins with a company’s employees, an area you can’t afford to ignore, and which I covered in an earlier post.

(more…)

By Brian McGinley, Identity Theft 911

In my last post, we established a foundation of control with the first seven steps to smarter security. This is the base on which we can build sound management practices, which is what we’ll cover in Steps 8 through 14.

8.    Set up a How-to Plan for Managing an Information Breach

When a breach happens it’s imperative to:

•    Identify it and escalate to the appropriate management and subject matter expert resources within the organization to initiate the launch of a deliberate breach response plan.
(more…)

By Brian McGinley,

On this blog we’ve talked about security as a path taken, rather than a destination reached. Over the next three posts we’re going to look at 21 concrete steps to walk down that path.

Reviewing these recommend steps will help you better understand the risks posed to your business.

1. Understand Your Threat Environment—Operating Risk vs. Fraud

(more…)

By Brian McGinley, Identity Theft 911

Intelligent businesses walk the security journey every day, whether management models security-smart behavior in the office or IT stays abreast of the latest technology developments. But for newcomers those first steps can feel like major leaps, especially if it involves getting coworkers, employees and executive management on the path.

Discussion prompts action, and I’ve found over my years in corporate management and data security that these four simple questions can often get the ball rolling: (more…)

By Brian McGinley

Data breaches are an everyday occurrence affecting millions of Americans each year.

Just ask crafters who shop at , Sony PlayStation Network gamers and investors at Morgan Stanley Smith Barney.

They’re all vulnerable to identity theft and other fraud because their personally identifiable information (PII), such as a birth date or Social Security number, for example, was exposed. That information could be used to commit financial fraud.

What should you do if this happens to you? The first step is to call your insurance company or bank to see if you qualify for . We’ll help you assess your risk and, if warranted, take steps to make you less vulnerable.

(more…)

By Brian McGinley,

 

 

We’ve talked about how to protect your identity in the aftermath of a disaster such as the deadly tornadoes in the South and Midwest.

But what can you do before catastrophe strikes?

If you live in a danger zone—areas susceptible to earthquakes, flooding and bad weather—it’s important to get organized. A little preparation can go a long way when your family is recovering from a cataclysmic event.

(more…)

By Brian McGinley,

Small businesses take note: Verizon recently just released its , and the findings have real implications for companies with fewer than 100 employees.

The number of stolen records dropped dramatically to 4 million in 2010, down from 144 million in 2009. But the tally of confirmed breaches rose sharply to 761 from 141 the previous year.

How can we explain these numbers? Hackers are changing their tactics and chasing opportunities. They’ve noticed that many larger corporations are doing a better job of protecting their information. So black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it.

(more…)

For families prepping for spring and summer vacations, as well as employees often traveling to various international locales, identity theft is one issue to consider.

Senior Vice President of Data Risk Management Brian McGinley offers tips and advice for those heading for a getaway or traveling on business.