Category Archives: Security

Information Classification

Information classification within an organization means deciding what level of user is allowed access to any data sent internally and externally. Data that enters a system without information classification is automatically assumed to be Top Secret. The Top Secret classification minimizes the number of people who are able to see the information, so important policy changes or updates will not be viewable to all of the necessary users. Also, the cost to encrypt and authenticate Top Secret level information is substantially higher than the cost to classify information for internal use only. Continue reading

How to Keep Your Web Browsing Secret

The proliferation of lightweight laptops and handheld devices has made browsing the web easier than ever. You can take a seat in the lobby of your hotel and check email while you wait for your room to be ready. You can get some work done in the local coffee shop while you sip your morning latte. Continue reading

Information Rights Management (IRM): The Best Protection for Sensitive Computer Files

Most people get a shock when they’re shown just how much sensitive data is stored insecurely on their computers. Naively, many think that a log-on password is sufficient to protect their sensitive data. It’s not. The most obvious reason is that such security is irrelevant if a sensitive document is sent to another person; the original author has to rely solely on that person’s undertaking to preserve its confidentiality. There’s little to prevent the recipient from copying the document and forwarding it or part of it to someone else. The document’s security is at additional risk if any other person has access to the recipient’s computer. There is a better way. It’s called information rights management (IRM). Continue reading

Holography and Credit Card Security

Holography and Credit Card SecurityPlastic card printing, such as that used for credit cards, often makes use of so-called holograms for security purposes. It’s important to distinguish the pseudo-holograms used on credit cards from “real” holograms that are formed on expensive dot matrix machines or through electron-beam lithography. Continue reading