Close

Articles Posted in Information Security Newsletter

Updated:

CLLB Information Security Newsletter. April 2009 Volume 2 Number 4.

http://www.msisac.org/April 2009 Volume 2 Number 4. From the Desk of David Badertscher The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer…

Updated:

CLLB Information Security Newsletter. March 2009 Volume 2 Number 3.

March 2009 Volume 2 Number 3. Social Networking Sites: How To Stay Safe From the Desk of David G. Badertscher The popularity of social networking sites–such as MySpace, Facebook, Twitter and others–has exploded in recent years, with usage in the United States increasing 93% since 2006, according to Netpop Research.…

Updated:

The Oxford Companion to International Criminal Justice

Book Review by David Badertscher* March 6, 2009. The Oxford Companion to International Criminal Justice Antioio Cassese, Editor in Chief Oxford University Press 2009 Book Review: The Oxford Companion to International Criminal Justice Antonio Cassese, General Editor. Oxford University Press, 2009. When Antonio Cassese, Professor of International Law at the…

Updated:

U.S. Supreme Court: United States v. Hayes (No. 07-608)

From the ABA Criminal Justice Section: http://www.abanet.org/crimjust United States v. Hayes (No. 07-608) “The court released an opinion regarding the prohibition on possession of a firearm by convicted felons to include persons convicted of a misdemeanor crime of domestic violence. Police officers discovered a rifle in respondent Hayes’s home. Hayes…

Updated:

CLLB Information Security Newsletter. February 2009 Volume 2 Number 2.

February 2009 Volume 2 Number 2. CLLB Information Security Newsletter Monthly Cyber Security Tips NEWSLETTER February 2009 Volume 2, Issue 2 Cyber Security Trends for 2009 From the Desk of David Badertscher The volume and complexity of cyber threats continue to increase. More of our activities-whether at home, school or…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Updated:

Technology Escrow Agreements: Safeguarding Technology Investments

“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research…

Updated:

CLLB Information Security Newsletter. December 2008 Volume 1.

December 2008 Volume 1 Pop-Ups From the Desk of David Badertscher We’ve all experienced Pop-up windows, or “pop-ups,” while browsing the Internet. Pop-ups may appear without any interaction or prompting by the end user. They can be innocuous, such as when used for advertising, but they can be used for…

Updated:

CLLB Information Security Newsletter. November 2008 Volume 3, Issue 11.

November 2008 Volume 3, Issue 11 MAIN TOPIC: Internet Shopping – How to Enhance Your Security Online From the Desk of David G. Badertscher The Holidays are Approaching – Help Protect Yourself and Shop Smart! The holiday shopping season is upon us and the volume of online shopping is increasing.…

Updated:

CLLB Information Security Newsletter. October 2008.

October 2008 October is National Cyber Security Awareness Month Volume 1, Issue 6 Phishing – How to Avoid Getting Hooked! From the Desk of David Badertscher What is Phishing? Phishing is a scam which attempts to entice email recipients into clicking on a link that takes them to a bogus…

Contact Us