In the news: (more) security breaches

The ThreatStats section of the April 2012 issue of SC Magazine lists the top data breaches of the month. At the top of the list is Piedmont Behavioral Healthcare in Concord, NC with 50,000 records breached. The reason? An Alamance County employee mistakenly changed a lock on the facility that housed data servers with personal health information. Amazing how one simple mistake put the records of all those people at risk.

Next is the St. Joseph Health System in California with 31,800 records breached. It seems that protected patient informationSC Mag Logo from several hospitals may have been available on the Internet for one year. Again, unbelievable!

The last one is Central Connecticut State University with 18,763 records breached. The reason listed is a malware infestation exposed the information of current and former faculty, staff, and student workers.

Another staggering statistic is the total number of records containing sensitive personal information involved in security beaches in the U.S. since January 2005: 544,669,041!

SC Magazine lists the source of this information as the Privacy Rights Clearinghouse (data from a service provided by hosted by the Open Security Foundation).

Don’t add yourself to this list. To learn how you can prevent network breaches from unauthorized network connections and out-of-compliance devices, take at look at Black Box’s Veri-NAC®.

For easy WAN encryption with no VPN tunnels, take a look at EncrypTight®.


Do you know who’s on your network?

In this day of BYOD—bring your own device—it’s challenging to know what kind of devices want access to your local area network (LAN) and how to protect your corporate network from non-corporate assets who should still should be able to access the Internet.

Your organization has a firewall to stop hackers, viruses, and malware at the network’s edge. A firewall is vital to safe network operation, but because it operates at the edge of your network, it can only protect you from threats coming from outside your network.

NAC devices, on the other hand, protect your network from threats originating on the inside. Unauthorized devices connected to your network make your organization vulnerable to malware, viruses, and even internal spying and data theft. This is what a NAC device is designed to prevent, whether the vulnerability is a LAN port in a lobby or conference room, or a wireless access point.

In this age of BYOD to work, it’s even more difficult for your network to know what devices should be blocked. Most of the time, BYOD users are employees, guests, or contractors who need access to certain network areas, but as non-corporate assets, they should be steered away from others. A NAC that works with your network infrastructure can easily address that concern.

Continue reading

Register to win a Veri-NAC 5220!

Register to Win a Veri-NAC 5220
Network access control (NAC) prevents unauthorized devices from connecting to your network through data ports—which are inside your network. Unauthorized users can plug in, but with a NAC in place, they can’t connect.

From now until March 31st, register to win your own Veri-NAC 5220. We’re giving away five!

Protect your customers’ information. Register to win a Veri-NAC 5220 for your small network, and protect your network from vulnerabilities firewalls can’t defend against.

For official contest rules click here.

Good luck to all!

Win the security war

Here are seven strategies you can deploy to protect your network and premises:

1. Can you afford a network breach?

Harden your network with network access control and vulnerability management with Veri-NAC™. Use it to control who can connect to your network, detect malware, and comply with requirements for HIPAA, GLBA, and other security and privacy standards.

Learn more at Or click here to have a security specialist contact you.

2. Are users infecting computers?

Rescue files and vanquish malware with the Data Rescue Engine (DRE). It actively seeks, destroys, and blocks malware. Use it alone or with Veri-NAC (above). Learn more at  Or click here to have a security specialist contact you.

Continue reading

One unsecured data port—that’s all it takes

A recent study conducted by HIMSS Analytics™ found that 52% of large hospitals reported a network security breach during the previous year. The HITECH Act requires electronic security for health records—a task that becomes ever more difficult in the face of today’s malware and other advanced threats.

Are you ready for HITECH?

Network access control (NAC) is essential to any complete network security plan. NAC protects your network by preventing unauthorized devices from connecting inside your network through ports or wireless connections. Unknown laptops can plug in, but they can’t connect. Unauthorized wireless devices can see your signal, but they can’t get on—even if they have the password. Continue reading