The Integrity News
Vol. XIV No. 4 ISSN 1081-2717
"objective risk management services"
June 1, 2005
Employers have a special duty to protect personal and
organizational data. All sorts of data can be used to
access, and drain, bank accounts and other sources of
funds.
With the cost of computers now relatively low, many
organizations are replacing slow computers that have
small hard drives and little RAM. However, they are
merely "deleting" the files on the hard drives of those
discarded computers. Those hard drives need to be
properly "scrubbed" so that sensitive data is actually
removed and cannot be retrieved. You may have
employee SSNs, company financial data, confidential
marketing and bid information, and personal data on
job applicants --- that you think is "deleted". There
are crooks out there today who harvest information
from discarded hard drives and get a big price for it
for all sorts of illegal purposes.
You also have to be wary of the following:
"PHISHING" -- You get emails from groups posing
as banks, auction sites, credit card processors, and
the like. They link you to fake Web sites, and use
stolen logos and other "real looking" elements to
try to get you to enter passwords and personal data
that they capture and use or sell.
"WI-PHISHING" -- Cybercrooks set up wireless
networks, hoping that people will use them to connect
to the Internet. They monitor the use of those networks,
and steal passwords and other identity information when
people log in.
"PHARMING" -- The crooks attach viruses to emails
that they send to your computer which monitor your
every keystroke. When you sign on to something
related to finance, they steal the the passwords.
"TYPO-SQUATTING" -- The crooks set up websites
with addresses that are similar to legit websites. When
you make a typo and land on their fake sites they look
and feel real while you are being ripped off.
Now, there is an even more brazen technique. If the
crook can plant a virus on your computer that will
encrypt your files, they will leave you an email ransom
note. Then, until you pay the crook for the digital keys
to unlock the files, your computer is held "hostage".
Leading security and anti-virus firms are working right
now on software that will protect organizations from
"ransom ware".
To discuss data security, identity theft prevention, and
related topics, feel free to call
The Integrity Center, Inc.
at (972) 484-6140.
Helping you with your Risk Management and HR Automation is what we do.
|
|