ipswich logo

Ipswich Hospital Chooses DatAnywhere

Ipswich Hospital NHS Trust is a busy district general hospital in Suffolk, England. Its 3,500 employees serve the medical needs for a community of over 350,000 people. The Ipswich IT Team was recently faced with an information security challenge. How do you share sensitive, internal documents from the hospital file system with third-party organizations (insurance,…

Alex Is Smarter Than a Hacker [Contest]

We had a strong feeling that our Metadata Era readers were up to our hashing challenge. And they certainly came through. After reviewing many solutions, our judges have chosen Alex Bessonov of New Jersey as the contest winter. And his victory came just in the nick of time: his son’s Nexus 7 had recently stopped…

new-york-world_s-fair-1964-1

Privacy Predictions 2025!

After posting our IT predictions for next year, we decided to assign ourselves an even more challenging task. Using recent headlines from the tech press as a baseline, we tried to extrapolate ahead to the year 2025. Where might today’s stories about technology and privacy lead to in ten years if we don’t change how…

800px-Ancient_warded_lock_key_transparent

Crypto’s Fatal Flaw: Stealing the Master Key

At the beginning of the year, Cindy and I attended a crypto workshop held at a local college in NYC. We heard experts talk about a fact of life well known in the security world, less so in the IT space: crypto is not very healthy. The prime culprits are a slew of advanced persistent…

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

ebook-credential

New Varonis eBook Helps You Hacker-Proof Passwords and Other Credentials

Are you really who you claim to be? That’s the key question that authentication tries to solve. NTLM, Kerberos, one-way hashing, challenge-response protocols, and two-factor authentication are just some of the technologies that have been developed to prove user identities and foil intruders. In recent years though, hackers have become far cleverer about getting around…

password generator

How to Be Your Own Best Password Generator

Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing or looking up  password hashes in large pre-computed tables. How bad is our collective password making abilities? You can see for yourself. After the epic…

SL-Access_card

PoS Malware Mitigation Advice from the Pros

There’s still much we don’t know about the attacks that targeted retailers’ PoS systems over the last year. We do know for certain that Backoff, BlackPos, and its variants were used as the RAM scraping software, and the hackers had considerable time to remove or exfiltrate the data. But there are still questions about how…

health-spreadsheet-tilted

The Worst Assumption You Can Make About Healthcare Information

There’s a common misconception that HIPAA only applies to database records. It’s somewhat understandable because “health record” is used frequently on the Health and Human Services (HHS) web site. However, if you read the actual language of HIPAA more closely, you’ll see that the rules cover protected health information (PHI) in any electronic format. Have…

Traitorware

PoS Cyber Attack Insight: Malware Isn’t What You Think It is

As headlines over the last few months have shown, hackers are becoming more and more resourceful at getting through corporate firewalls to directly attack retail terminals and back-end PoS servers. If IT can’t stop them from getting through the front door, is there a second line of defense to, at a minimum, contain the cyber-thieves…