OSHA has recognized the management and employees of Schneider Electric USA Inc. by naming the company’s facility in Lincoln, Neb. a star site in the Voluntary Protection Programs. Schneider Electric USA manufactures miniature circuit breakers, earned it after a comprehensive on-site evaluation by a team of OSHA safety and health experts.… Continue Reading Schneider Electric Site Named VPP Star in Lincoln, Nebraska

Far too many security awareness training programs start with a series of horror stories about hackers and identity theft, lost money and damaged reputations, privacy breaches and deleted computer files. Before long, the average student starts to tune out – after all, if it’s that bad out there, there’s not… Continue Reading Security Awareness and Climate Change – Scaring People is Not the Right Approach

Hackers don’t always try to break into computer systems through the Internet, or by using malicious software (malware) in email attachments. If they can gain physical access to computers, there’s often a simpler way. Several public libraries in the UK have reported finding keyloggers attached to the back of PCs.… Continue Reading Sometimes Hackers Use Hardware

Another reminder – as if we needed it – that smart phones and mobile devices are increasingly the targets for hackers. This time, it’s an iPhone issue. German researchers claim to be able to steal passwords stored on a locked Apple iPhone in just six minutes … without cracking the… Continue Reading Stealing Passwords from a Locked iPhone – More Smart Phone Insecurity

The FTC has posted a useful guide to “medical identity theft” for health care providers and insurers. Medical identity theft occurs when someone obtains health care services e.g. treatment, prescription drugs … using the identity of someone else, or when they use another person’s identity to submit false bills. The… Continue Reading Medical Identity Theft – Advice from the FTC

Looking for a video to show your staff some of the ways that they might breach the HIPAA Privacy and/or Security rules? Here’s a short (5 minute) YouTube video from UNLV called HIPAA Happens that illustrates some possible scenarios. Send the link around to your staff in an email or,… Continue Reading HIPAA Happens – A Video from UNLV

Cloud computing is filled with buzzwords and, for many people, fear of the unknown. And a lot has been made of the security risks that might result from cloud computing. However, for many organizations (especially small businesses and non-profits), judicious use of cloud computing applications can have significant security benefits.… Continue Reading Security Benefits of Cloud Computing

Your desk may overlook the desolate edge-of-town business park and the only lunch venue is the canteen, but look on the bright side: you could spend your meal break browsing a book from the New York public library, absorbing an Oxford University lecture on the fall of the Roman empire… Continue Reading The secret to e-learning

With few exceptions, rules relating to privacy and security such as HIPAA and GLBA (Gramm Leach Bliley) cover the information, and don’t specifically relate to any particular technologies. So, they apply whether you’re using your PC, a fax machine, a photocopier, a USB flash drive, or even your cell phone.… Continue Reading Privacy and Security Rules Cover Information – Not Technology

The FBI recently issued a warning about malware included in email attachments responding to online job postings. They quote the case of a US business that lost more than $150,000 after an employee opened an attachment that had been sent in response to a job posting. Malware embedded in the… Continue Reading Even If You Expect An Email Attachment, It’s Not Always Safe