Guide your privacy with RecentCleaner

January 6th, 2007

AKS-Labs has released a version 1.0 of RecentCleaner, a personal privacy tool designed to browse and clean recently accessed files list. The program supports WinZip, WinRar, Word, Excel, PowerPoint, Windows recent files.

Learn more about clearing recent files.

Insurance offered for identity theft

December 29th, 2006

Amid warnings about the risk of identity theft, Canadian insurance companies have begun offering policies that help defray the cost of setting things right, if you fall victim.

Identity theft occurs when a crook uses another person’s name and other personal information such as social insurance number, credit-card number or bank account illegally to make purchases, borrow money or make some other costly transactions without the victim’s consent or even knowledge.

According to research by Phonebusters, a national anti-fraud organization…, thousands of Canadians a year report cases of identity theft — although the rate may be lower now than it was a few years ago.

It can be time-consuming and costly for innocent victims of identity theft to compile the information and get the legal advice required to verify they aren’t at fault. It’s those expenses — such as lost wages, lawyer and notary fees and courier charges — that are covered by identity theft insurance.

“Those are where the real expenses come in. It’s not the $5,000 or $10,000 loan. It’s the expense of clearing everything up,” says Bryan Seaton, spokesman for ING Canada, which recently began offering identity theft protection across Canada.

There has been increased public awareness of the measures — such as shredding documents with account numbers, proper storage of passwords and account numbers and software protections for your computer — that can be taken to prevent your personal information from getting into the wrong hands.

“We have a duty to defend your title. So we do what we can to get it resolved. Or, in a worst-case scenario, we can pay out the money that you’ve lost as a result of this problem,” says Kathleen Waters, vice-president of Title Plus, a service provided by Lawyers’ Professional Indemnity Co.

See full story.

This blog is run by the authors of FindProtected.
FindProtected is a security program that allows you to search for password protected files. With FindProtected, you can effectively identify protected files containing sensitive data on your network.

How to manage your records

December 23rd, 2006

- Consider investing in a records-management software system to ensure the secure preservation of records electronically.

There are very reputable companies that make software for legal records management. Most of these software systems are licensed per work station, so it can be a costly investment. So whoever is in charge of this should shop carefully.

- Do not consider an e-mail In Box as a tool with which to manage records.

The e-mail systems like Outlook were never meant to be records-management systems. When e-mail files get really large, they tend to get corrupted…

When it’s e-mail, you probably have all kinds of things in there and don’t separate the wheat from the chaff because it takes too much time. So you get sloppy.

If you are going to use your e-mail as a client file, think about what you want in there and what you’d want someone else not to see. Delete it, and then delete the deletion.

- Store records in a location outside the offices of your law firm.

Even in small and midsize firms, there’s so much data it’s hard to back it all up on one tape, and it becomes harder to recover that much data. So some firms are turning to business continuity systems [with which] they send their data electronically off-site so it can be easily retrieved.

- Leave the records-management responsibility to an expert in the field rather than rely on an in-house policy.

Most large firms have had a director of records or a manager of records, which was mostly a paper-pushing position. But what has happened is that 80 percent of records now are electronic, and so it’s an entirely different process to manage electronic records. That’s where an information officer [comes in and] works closely with a records manager to do the overall management of the electronic records.

- Follow the lead of publicly traded business clients, which have had to pay close attention to their record-management practices as federal regulation of those practices has tightened.

Regulation that’s now affecting publicly traded companies, such as Sarbanes-Oxley [a 2002 federal law that established strict standards for corporate governance], will probably come to affect private industries like law firms, and that will mean lawyers will have to be much more careful about how their firms keep their records.

(c) HENRY CHACE

This blog is run by the authors of FindProtected.
FindProtected is a security program that allows you to search for password protected files. With FindProtected, you can effectively identify protected files containing sensitive data on your network.

Recent files security risks

December 19th, 2006

Recent files, also referred to as temporary files, are those created automatically and stored on the system’s hard drive. Microsoft Windows uses many temporary files to store data about the users’ web browsing history and settings.

There are some potential risks and dangers associated with recent files, read more about recent files and security risks.

Don’t allow ID theft to ruin your holidays

December 8th, 2006

Here are a few simple reminders to help prevent crooks and identity thieves from stealing your holiday spirit:

- Don’t carry your Social Security card with you: Identity thieves can use it to set up new accounts at different addresses without your approval, or your knowledge.

- Take care to remove your bank deposit slips from your purse or wallet as soon as you return home – they often contain important personal information that needs to be closely guarded.

- Carry only one (or at the most two) credit cards with you when you’re out shopping.

- Write the words “see picture ID” on all of your credit cards. While many clerks are trained to check photo identification, it doesn’t hurt to remind them.

- Guard against “shoulder surfers” – thieves hovering around you at the ATM or check-out scanner.

- Carefully shred your bank and credit card statements.

See full story.

We also recommend you to safeguard all sensitive information stored on your PC or PDA. Sensitive data stored on your computer should be protected with specific software tools and kept in a “safe place” on your hard drive or removable devices.


This blog is run by the authors of FindProtected.
FindProtected is a security program that allows you to search for password protected files. With FindProtected, you can effectively identify protected files containing sensitive data on your network.

China is more concerned over IT security

December 2nd, 2006

China has launched an information security certification center in Beijing recently. Information security has become a serious problem in China with the rapid growth of the information industry. “Crimes through the Internet, computer viruses and junk mail has threatened security”.

“Some departments have set up systems on evaluation, licensing or purchase of security products but a unified national system is required to avoid repetition,” said deputy director of the Information Office under the State Council.

Apart from certification of security products, the center would also conduct talents training and technology research and development on information security.

China boasts the world second largest population of “netizens” behind the United States, exceeding 123 million last July.

See full story.

This blog is run by the authors of FindProtected.
FindProtected is a security program that allows you to search for password protected files. With FindProtected, you can effectively identify protected files containing sensitive data on your network
.

10 most popular file shredders

November 22nd, 2006

We always get the user’s feedback with questions concerning the usage of the background file wiping feature of our Shred Agent, asking whenever it is reasonable or not, and whenever analogous programs have this feature or not. That is why AKS-Labs has asked the independent software expert to review and compare 10 most popular shredders, including the Shred Agent itself.

Click to read the comparative review of 10 file shredders.

How to Protect Your Mobile Data

November 18th, 2006

In today’s workplace, it’s impossible to eliminate mobile computing devices — laptops, thumb drives, mobile phones, PDAs and iPods. However, “since California enacted a data breach notification law in 2002 (followed by 32 other states), there have been a host of embarrassing disclosures about missing computers”.

About half of the states’ breach-reporting laws give companies a way to avoid disclosing such breaches: the use of encryption on the mobile devices.

But encrypting data on mobile systems isn’t a simple task. CIOs and CISOs have found that while the technology to encrypt laptop hard drives is pretty straightforward and simple to deploy, there are several aspects of mobile security for which technology is not yet solid, particularly for protecting data on removable media and handheld devices. That’s why security leaders who have adopted encryption make sure to use other techniques — both technological and managerial — to protect their mobile data.

The first decision when implementing an encryption strategy is whether to use full-disk encryption or file-based encryption. Although most operating systems have built-in file encryption tools, this approach has a significant security flaw: It relies on users putting files in the encrypted folders.

The other option is full-disk encryption, which protects everything on the hard drive. The latest disk-encryption solutions are easy to use and are not likely to slow down performance. “Several companies — including PGP, Pointsec and GuardianEdge Technologies — provide enterprise-class full-disk encryption software that can be installed and managed using standard tools, and that works with backup software and password management systems.”

See full story.

Data encryption is important for the security of stored data. However, it is also important to use secure file removal applications. If the sensitive data was deleted from laptop or PC using unsecure operations, it can still be recovered. To protect your deleted data, you need to use specific file wiping tools.

This blog is run by authors of Shred Agent and QuickWiper.

Junk Mail Could Be Linked to ID Theft

November 12th, 2006

Junk mail is more than irritating. In fact, it’s increasing your risk of identity theft.

For instance, you have a check from Household Bank in your junk email and it’s probably not a check for anything you’re actually participating in. This is more of a solicitation, and if you cash it they hold you responsible. The problem is what happens if you don’t get it and somebody else does.

If that happens, it would be very easy for a criminal to cash the check, and you’d be on the hook for the money until you cleared up the problem with the bank. And speaking of banks, most of us are inundated with pre-approved credit card offers. Even without your Social Security number, a crook could use these applications to obtain a credit card in your name.

All they really have to do it get this fill those in and use them and you’re going to be on the hook for whatever amount they wrote the check for. You could also face legal trouble if the checks bounce and the vendors file a complaint with the local prosecutor.

To protect yourself, you can contact the credit bureaus and tell them to stop the pre-approved credit offers, and you can contact the Direct Marketing Association and have them put you on their no junk mail list.

But it is much more important to use secure email deletion to reduce the risk of identity theft. Shredding your junk email allows you to save a lot of time and money by ensuring your email will not be used for malicious goals.

See full story.

This blog is run by authors of Shred Agent and QuickWiper.

“Prison Break” movie lessons – how to destroy hard disk FAQ

November 2nd, 2006

If you watched a “Prison Break” movie then you might remember scene when hard disk was taken from the river and 60% of data was recovered. Let’s list some ideas about how to secure your hard disk:

1) Don’t give out (through away) a hard disk with valuable data;
2) The best way to destroy data is to drill your hard disk or break it completely;
3) If you don’t have a drill or you want to use something safer… then you should use file shredder;

File shredders
You will need two functions in file shredder – wiping free space and wiping files; Wiping free disk space is necessary to make previously deleted data irrecoverable, wiping files makes it impossible to recover files that you delete.

What is good file shredder? It’s secure, it don’t need you action, it wipes even temporary and cached files. In this case consider using background mode file shredder.

Finally, keep your files in secure place!

This blog is run by authors of Shred Agent and QuickWiper