Privacy matters even for those who don’t care

There are so many ways to share on social media today and users, especially the younger generation, are sharing almost everything.  The problem is that some data is not meant to be shared.  A culture of sharing is developing that can be quite harmful for businesses and the confidential information they hold.  It is even more important in this day and age to educate employees on what they can and cannot share.  Consider implementing a social media policy that specifies sharable data and data that must remain confidential along with sanctions for those who violate the policy.  Make sure that all employees are aware of the policy and why it is in place.  Lastly, make sure the policy is enforced through both technical and procedural controls.

When and why companies disclose your information

The Electronic Frontier Foundation issued a report on 18 web and technology companies that routinely handle data.  The study looked at the following six security policy and practice areas related to how the company responds to requests for user information.

  • Does the company require a warrant before releasing information?
  • Does the company inform users of requests for data?
  • Are statistics published on how often data is provided to requesting agencies?
  • Does the company have a policy outlining how they respond to information requests?
  • Does the company stand firm when information requests are too broad in scope?
  • Does the company support revisions to electronic privacy laws?

Some of the results of the study are surprising.  Dropbox, Linkedin, Sonic.net and Twitter were some who ranked the highest.  Others such as Amazon, Yahoo, and Apple ranked towards the bottom and Verizon and Myspace were the lowest.

Download the EFF report

Search Activity Correlation

I looked at my Google search history today and wondered if my search history is directy correlated with my productivity. If so, my most productive times are at 11:00 AM and 4:00 PM with the surrounding times slightly less productive. I have frequently said that I gear up from Monday and peak at Thursday but then start to die down on Friday. The search activity shows that, for the most part, this is true except that I do a little bit more searching on Mondays than I do on Tuesdays.
Search Activity

Great Firewall of China

Computer experts from the University of Cambridge were able to breach the ÔÇ£Great Firewall of ChinaÔÇØ and also have found a way to use the firewall to launch DoS (Denial of Service) attacks. .
The firewall was tested by sending data packets containing the word "Falun" to it. This word is a reference to the Falun Gong religious group, which is banned in China. By using forged packets, they were able to circumvent the firewallÔÇÖs filters.
Furthermore, the Chinese firewall can also be used to launch denial-of-service attacks. The system can essentially be turned around on the Chinese government. Sites could be blocked that the Chinese government wants people to see and others could be let in.