Stories by Joan Goodchild

  • 4 reasons why Facebook and vanity don't mix

    My colleague, Bill Brenner, has a t-shirt he likes to wear that basically says social networking feeds the darker sides of human nature. The shirt is a parody of a Venn Diagram and shows the relationship between sites like Facebook and Twitter to what some might called undesirable character traits, such as ADHD, stalking and narcissism.

  • E-voting: How secure is it?

    Election fraud and vote tampering is as old as government. Before the American Revolution, most voting was done by voice. Voters would call out their pick for all to hear, which lead to intimidation and other nefarious tactics by those hoping to impact election results. The creation of the secret ballot was an improvement, but brought with it another host of possible modes of manipulation. In a quote that is now famous in American history, corrupt politician and Tammany Hall leader Boss Tweed often told constituents to 'vote early, and often.'

  • How to spot fake job references

    There have always been unethical and/or desperate job hunters out there who have used a friend or relative as a reference in order to up the chances of landing a position. Providing a fake reference that will lie and speak glowingly about you is nothing new.

  • Data breaches not among top concerns for tech firms

    Data security and breach prevention ranks low as a risk factor for most big technical companies, according to new research that identifies the most widespread concerns among the 100 largest U.S. public technology companies. The research, released by BDO, a professional services firm, examines the risk factors listed in the fiscal year 2009 10-K SEC filings of the companies; the factors were analyzed and ranked in order by frequency cited.

  • How investigators work to combat data theft

    In almost two decades of work in the financial services industry, Brad McFarland has spent most of that time heading up fraud investigations. McFarland, currently director of corporate security with The South Financial Group, a South Carolina-based financial services holding company, is also responsible for the organization's physical security and loss preventions in addition to fraud investigation.

  • 3 basic steps to avoid joining a botnet

    Banging the drum for security awareness never gets old. As much as CSOs try to get folks to bone up on safe practices (both online and in the office), there are always going to be some who need reminding.

  • How a Botnet Gets Its Name

    There is a new kid in town in the world of botnets - isn't there always? A heavyweight spamming botnet known as Festi has only been tracked by researchers with Message Labs Intelligence since August, but is already responsible for approximately 5 percent of all global spam (around 2.5 billion spam emails per day), according to Paul Wood, senior analyst with Messagelabs, which keeps tabs on spam and botnet activity.

  • Is your office printer secure?

    Hackers may be using your office printer as a conduit for criminal activity. Think about it: A printer in today's office environment often saves on its hard drive all images of documents that are printed, scanned or faxed. Therefore, hackers who know anything about accessing files on a network might easily gain access to that sensitive data (Read about some of the security features on modern printers in Joe's Office: Secure Printer).