You are viewing 'PII'

Spring Cleaning - Infosec Style

Bernie Lambrecht

March 05, 2015 - Posted by Bernie Lambrecht to Security Insight

Spring Cleaning

March is finally here. It’s time to (hopefully) say “goodbye” to all the snow and “hello” to all the birds and pretty flowers, along with all the allergies they bring.

March is also a good time to do some spring cleaning. Open up your windows and air out your house. Shake out your rugs. Sweep up all that sand and other crud that the snowplow crews throw down when clearing your streets.

While you’re cleaning up and getting rid of stuff, you can also do the same thing with your information security, both at home and work. Here are a few tips on how to do it:

  • When clearing out unnecessary papers from your file cabinets or wallets/purses, make sure you don’t just throw them out. Shred any documents that have your Personally Identifiable Information (PII), like your bank and credit card statements, insurance mailings and old tax returns. You can purchase a personal shredder at any Target, Wal-Mart or office supply...
read more >

Top 7 Social Media Security Practices

Susan Carter

January 15, 2015 - Posted by Susan Carter to Security Insight

social media security

Recently, the husband of a good friend of mine passed away.

They had very little money to pay for the horribly outrageous funeral cost. The local newspaper was going to charge my friend more than $300 each day to run a limited obituary. Instead, she and her husband’s brother posted the logistical information of the viewing and services on the husband’s Facebook page, as well as their own. The turnout was astounding and beautiful. It appeared that everyone who mattered had been informed and the outpouring of kind words and condolences was touching.

I honestly believe that had my friend just posted a print version in the local paper, only a fraction of the people who really cared would have been notified. This experience got me thinking.

I interact as little as possible with social networking applications, being in the security field and knowing what I know. 

Since my daughter-in-laws post pictures of my grandkids, I have some... read more >

Ghosts in the Machines

Cybercriminals Continue to Provide Tricks, Not Treats

Joseph (JB) Blankenship

October 31, 2014 - Posted by Joseph (JB) Blankenship to Security Insight


It really wouldn’t be right to wrap up National Cyber Security Awareness Month (NCSAM) on October 31 without a Halloween-themed blog.

The NCSAM topic for the final week of the month is “Cybercrime and Law Enforcement.”

It’s not hard to make the analogy of cybercriminals and hackers being “ghosts in the machines.” After all, these malicious actors move about invisibly, easily moving through the technical walls built to keep them out. It’s spooky stuff.

As we have seen throughout 2014, cybercriminals are actively at work, continuing to infiltrate systems and make off with valuable data – credit cards, healthcare records and other personally identifiable information (PII).

The numbers are frightening themselves. A McAfee report from June 2014 estimates that ... read more >

Apple Pay vs. Other Tap to Pay Providers

Apple Pay May Revolutionize Secure Mobile Payments

Melinda Reinicker

October 29, 2014 - Posted by Melinda Reinicker to Security Insight

Apple Pay

Apple Pay Joins Tap to Pay

Last week, on October 20, 2014 Apple joined others in the new near-field communication (NFC) based  Tap to Pay market (this doesn’t count their original Passbook offering) with Apply Pay. On Monday, Apple CEO Tim Cook stated that over one million credit cards had been activated on Apple Pay within the first 72 hours of its release, declaring Apple as the market leader in Tap to Pay.

Cook is also quoted as saying, “You are only relevant as a retailer or merchant if your customers love you.” and “It’s the first and only mobile payment system that’s easy, private and secure.”

That’s the goal of all the Tap to Pay pioneers, making a system that easy, private and secure. In a year when many large merchants are disclosing credit card breaches of unprecedented size, the market is... read more >

24 Months of Free Identity Service

California Assembly Bill No. 1710

Erik Barnett

May 20, 2014 - Posted by Erik Barnett to Security Insight

As of right now, there is not an umbrella law for the protection of personal privacy from a federal perspective. Each state is left to decide on how they would like to deal with the personal privacy of their constituents, such as notification of breach or providing identity theft services. In the state of California, lawmakers are hard at work on a new personal privacy bill to increase the protection of consumers throughout the state.

The proposed bill “Assembly Bill No.1710” was introduced on February 13, 2014, and will be presented for the final vote between the Assembly and Senate at the end of May.

Assembly Bill No.1710 is the first such bill to directly deal with this. Depending on how effective this bill is in California, many states may take the proactive approach of applying similar legislative bills. While there have been amendments... read more >

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)