Security Corner:


February 11, 2009  10:30 PM

Software for Secure Computing: Easy Email & File Security with AxCrypt

Posted by: Ken Harthun
Email security, Encryption, Secure Computing, Security

Most of the email we send and receive from our co-workers, family, and businesses contains little that requires any degree of confidentiality. The same goes for most of the files we have stored on our hard drives and thumb drives. Occasionally, however, we need to pass on or store some information...

November 5, 2008  9:17 PM

Software for Secure Computing: Ironkey

Posted by: Ken Harthun
Encryption, Secure Computing, Security

There's an old saw in security circles: "complexity is the enemy of security." The more complex something is, the more likely there will be flaws to exploit. Too, there are times when you just don't need the strength of AES encryption. Case in point: the company I work for utilizes a practice...

July 5, 2008  2:43 PM

The #1 Security Priority: Protect The Information

Posted by: Ken Harthun
Embedded systems, Encryption, Firmware security, Networking, Opinion, Security, Security management, Storage, Vulnerabilities

SANS recently reported that a Ponemon Institute survey, commissioned by Dell,...

June 30, 2008  3:55 PM

Virtual Safe Deposit Box?

Posted by: Ken Harthun
Cryptography, DataManagement, Encryption, Opinion, Portable computing, Security

A bank safe deposit box, securely stored in a vault behind several feet of concrete on five sides with a virtually impenetrable combination-and-time-lock-protected door on the sixth side, is about as safe a storage place as you can get for your cash, gold, jewels, important documents, and other...

June 20, 2008  1:02 AM

WiFi Security–The Only Way is WPA

Posted by: Ken Harthun
Cryptography, Encryption, Password, Security, Security management, Security maxim, Wireless

Please note: since this article was posted, WPA-TKIP has been found to be vulnerable. See my post of 2008.11.13 entitled "WPA-TKIP Vulnerable to Attack" for more...

May 31, 2008  2:13 AM

How to Secure Your Computer: Maxim #10

Posted by: Ken Harthun
Cryptography, Encryption, Password, Security, Security management, Security maxim

A friend of mine came up to me the other day and said, “I love your computer security maxims, but there's one thing I don’t have anything to worry about–I keep all of my passwords stored on an encrypted thumb drive.” "Well, that’s a good thing," I said. "Where do you keep your...

April 27, 2008  4:02 PM

If Your Laptop is Stolen, Will Your Identity be Stolen?

Posted by: Ken Harthun
Encryption, Mobile, Portable computing, Security, Security maxim

We frequently hear news of a laptop holding sensitive information having been stolen. Bad in itself, but the reports often note that the information was unencrypted. Doubly bad. The news rarely focuses on personal laptop thefts, however because there's no news value in reporting the loss of Joe...

April 7, 2008  8:46 PM

Make Your Own Paper Enigma Machine

Posted by: Ken Harthun
Cryptography, Encryption, Security

The Enigma cipher machine was a very cool electromechanical device for producing polyalphabetic...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!

Posted by: Ken Harthun
Cryptography, Data destruction, Encryption, Security, Storage

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...

March 20, 2008  1:23 AM

Paranoid About Hard Drive Security? Try This

Posted by: Ken Harthun
Data destruction, Encryption, Security

My company serves as the IT department for several medical, legal, social service, and banking organizations in our area. I don't have to tell you that every one of these organizations deals with information that falls under various government data security and privacy acts. Every one of these...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: