Blog

Why Is a Terrorist Like SPAM?

President Obama said that there were “systemic and human failures” yet there is no such thing as 100% security – just like there is no such thing as totally accurate SPAM filtering. So what do you do?

Read More »

Who Owns Your Information?

What happens if there is a digital rights management (DRM) failure, your application is discontinued, or your service provider goes bust? How do you get access to your data?

Read More »

H1N1 Is No Joke – Get Vaccinated – NOW!

Some commentators are trying to scare the population away from taking the H1N1 vaccine by quoting the Great Swine Flu Scare of ’76. Take some time to learn about what really happened and what was done about it. Then get your children vaccinated.

Read More »

It’s Not About Minneapolis, Really!

Northwest Flight 188 was out of contact for 90 minutes and overshot their destination by 150 miles while at 37,000 feet. Yet air traffic controllers waited about 40 minutes after losing contact with the plane before notifying the military – and fighters were never scrambled.

Read More »

Your Slip Is Showing… Again!

ChoicePoint suffered a security breach in 2008 after they had already been ordered by a federal court to impose a data monitoring system. Unfortunately, someone turned it off for 4 months.

Read More »

A Sidekick In The Pants

T-Mobile and the Sidekick data services provider, Danger, a subsidiary of Microsoft, have announced that they lost subscribers’ contacts, calendar entries, to-do lists and photos – and there is no backup.

Read More »

Is Your Toilet Disaster Tolerant?

Your company spent a lot of money on their disaster recovery and business continuity plans. They spent hundreds of hours doing tabletop exercises and full blown deployments to see if everything comes together as it should. But what happens if you need to tinkle?

Read More »

Oops! Did I really click “Send?”

An employee of Wyoming’s Rocky Mountain Bank inadvertently sent an e-mail with confidential information on more than 1,300 customers to the wrong e-mail address, and now they want it back. Isn’t it a bit late for that?

Read More »