Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices.
Mention cybersecurity and immediate thoughts turn to technical controls such as firewalls, endpoint detection and patching systems. While these and other technical controls certainly are necessary, they must work in tandem with administrative and physical controls in order to form a mature risk mitigation program. This month, we will explore some of the physical aspects of cyber risk management, which inherently relies upon on-site security personnel and employee training for proper execution.
U.S. Border Agents Can Search Travelers' Electronics for Signs of Terrorist or Other Illegal Activity, and Can Copy and Keep Files.
June 6, 2013
U.S. border agents are allowed to search a traveler’s laptop, cellphone or other electronic device and keep copies of any data on them based on no more than a hunch, according to an internal study from the Homeland Security Department.
18 percent of workers with office laptops share passwords; More than half don't have a laptop security device. What other security lapses abound in office laptop security?
A survey conducted on data security reveals that while it's clear that the average consumer understands the importance of safeguarding their laptops and personal information, there is a need for better consumer understanding of the need to protect both the device and data.