With the push for electronic medical records (EMR), one of the concerns is whether patient’s medical records confidentiality will appear on-line like other “WikiLeaks” data breaches we’ve all heard about.
The laws governing electronic communications are very antiquated. Many do not provide the Constitutional protections afforded to physical searches. This article discusses the California Governor allowing warrantless cell phone searches to continue.
Verizon and VMware are addressing the issue of having a “personal” phone and then having a separate “work” phone. With this new technology you will be able to have one phone with two totally separate and distinct phones inside. One is your phone managed by you.
Cool facts about Office: 750M people use Office worldwide. It’s installed on 1B computers & every version of Office has #MSWord.
This Networkworld article re-states from Microsoft what I stated in my “Steps you can take to improve the security and worker productivity on your computers and servers” post. Most infections are due to lax updating and patching standards rather than previously unknown viruses preying upon your computers.
Recently I wrote the post “Ensuring Maximum Stability of Blackberry Enterprise Server”. Blackberry just had a very nice companion article on identifying and troubleshooting messaging delays. You can read it here.
Here is a nice review of all the changes in Facebook as they relate to your privacy settings. If you use Facebook, it is worth reviewing this quick list of what they have changed and what you can do about it. https://www.networkworld.com/slideshows/2011/101011-facebook-privacy.
When I was involved in a case with the US Secret Service, they brought in an “ethical hacker” as their computer consultant. One of the techniques used against businesses is to target key individuals in the company and send them emails with infected links and attachments.