The essential guide to ISO 27001 - Negative PID

How many times have you seen the ISO 27001 badge on an IT company website? Of course, you might intuitively understand that a certified company projects an

Negative PID

DATE: April 13, 2026 at 07:23AM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

#RaaS Gang #Anubis Claims #SignatureHealthcare Data Theft https://t.co/GkJBBUT6dW #HIPAA #healthdatabreach #cyberattack

Here are any URLs found in the article text:

https://t.co/GkJBBUT6dW

Articles can be found by scrolling down the page at https://www.healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

"Some users may not care if an app knows their age, but a user will probably care about hackers having a copy of their driver's license with their photo, and address." (Distrowatch)

#PrivacyMatters #DataSecurity #DataSovereignty #KillAgeVerification #KillGovernmentAndCorporateTracking

FYI: LinkedIn hit with class action over hidden browser scan of 6,000 extensions: Class action filed April 6 alleges LinkedIn secretly scanned Chrome users for 6,000 extensions and routed device fingerprints to undisclosed third parties. https://ppc.land/linkedin-hit-with-class-action-over-hidden-browser-scan-of-6-000-extensions/ #LinkedIn #ClassAction #PrivacyConcerns #DataSecurity #ChromeExtensions
LinkedIn hit with class action over hidden browser scan of 6,000 extensions

Class action filed April 6 alleges LinkedIn secretly scanned Chrome users for 6,000 extensions and routed device fingerprints to undisclosed third parties.

PPC Land

Why a Locked Floppy Disk Could Be Safer Than a Modern Network

Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

THE LOCKED-BOX LOGIC

If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

MODERN SECURITY, NEW PROBLEMS

Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

Sources:
Britannica — https://www.britannica.com/technology/floppy-disk
Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internetHistory #intrusionDetection #officeHistory #physicalSecurity #techNostalgia
What is HIPAA? - Negative PID

If you’ve ever visited a doctor, picked up a prescription, or filled out medical forms, you’ve probably heard the term HIPAA. What is it and why is it

Negative PID

FBI investigators retrieved deleted Signal messages from an iPhone by accessing data cached in Apple’s internal notification database 📱.
The case highlights how stored notification previews can expose message content even after an app’s deletion, raising privacy and data retention concerns 🔐.

@signalapp

🔗 https://9to5mac.com/2026/04/09/fbi-used-iphone-notification-data-to-retrieve-deleted-signal-messages/

#TechNews #iPhone #Signal #FBI #Apple #iOS #Privacy #DataSecurity #Encryption #UserControl #Transparency #Forensics #iOS #DigitalPrivacy #Cybersecurity #OpenSource

FBI used iPhone notification data to retrieve deleted Signal messages - 9to5Mac

The FBI was able to recover deleted Signal messages from an iPhone by extracting data stored in the device’s notification database.

9to5Mac

I was just thinking about how easy it is to lose years of photos if a phone breaks. It is a good reminder to check your photo backup strategy. The 3 2 1 rule is a great way to stay safe. Three copies, two media types, and one offsite. It is simple to set up. Find tips here https://gwizit.com/go/tJcNCJ0. This was written by a human but with AI assistance.

#PhotoBackup #DataSecurity #TechTips

It is exactly what I visualize every time I see one of those "cookie consent" popups on a website.

#Privacy #GDPR #BigTech #Obfuscation #DataSecurity #SurveillanceCapitalism #TechPhilosophy #Fediverse #Blog #Meme

Cybersecurity does more than protect systems.

It protects data.
Prevents attacks.
Ensures business continuity.
Builds trust.
Reduces risk.

It drives growth and stability.

📩 Contact: https://www.vaptsecurity.com/

#CyberSecurity #InfoSec #DataSecurity