Healthcare Security

During a scan of the news today, I saw two articles related to healthcare security. One reported that an employee of the national health service (NHS) in the United Kingdom had a PC with patient data on it that he or she put up for sale on eBay. The second story was about an inquiry […]

Passwords

I just discovered some nasty things on my Facebook wall. I assure you it was not posted by me. I removed it and then checked my password. I had not changed it for a year. Shame on me. It is a good idea to change passwords frequently. I need to practice what I preach! And, […]

Privacy And Trust – Epilogue

Another dimension of Trust has to do with standards. Because of standards, the Internet is the only thing I know of that works the same everywhere. Most things work differently in different parts of the world. The side of the road we drive on, the side of the car we drive from, the width of […]

Privacy And Trust – Part 8

In “Too Secure?”, I described how a financial services company insisted that I use the fax machine to send them a document. Let’s contrast that process with how it might have worked using a public key infrastructure approach with the five security functions described in the last part of the Privacy And Trust series. We’ll […]

Privacy And Trust – Part 7

The most important benefit of a digital ID is authentication. Once digital IDs are more commonplace, you will no longer have to send your login ID and password over the Internet. Your password, passphrase, or biometric will go no further than your smart card, token, or your PC. Once you are authenticated, you will be […]