Archive for the ‘Information Security’ Category
Wednesday, January 14th, 2009
The latest PricewaterhouseCoopers (PwC) information information security results show that financial companies are still not doing enough for information security and privacy. Here are a few of the findings:
(more…)
Tags:awareness and training, Information Security, information security study, IT compliance, IT training, policies and procedures, privacy training, PwC, risk management, security training
Posted in Information Security | No Comments »
Friday, January 9th, 2009
Here’s another study about the increase in privacy breaches in 2008, and how most of them are caused by insiders…
(more…)
Tags:awareness and training, Information Security, IT compliance, IT training, ITRC breach report, policies and procedures, privacy training, risk management, security training
Posted in Information Security, Privacy Incidents | No Comments »
Thursday, January 8th, 2009
The following concept, taken from the January 12, 2009 issue of Time (page 56), can also be applied to information security incidents and privacy breaches…
(more…)
Tags:awareness and training, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk, risk management, security training
Posted in Information Security | No Comments »
Thursday, January 8th, 2009
The following concept, taken from the January 12, 2009 issue of Time (page 56), can also be applied to information security incidents and privacy breaches…
(more…)
Tags:awareness and training, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk, risk management, security training
Posted in Information Security | No Comments »
Wednesday, January 7th, 2009
According to a new Cisco study:
(more…)
Tags:awareness and training, Information Security, insider threat, IT compliance, IT training, policies and procedures, privacy training, risk management, security training
Posted in Information Security | No Comments »
Wednesday, January 7th, 2009
According to a new Cisco study:
(more…)
Tags:awareness and training, Information Security, insider threat, IT compliance, IT training, policies and procedures, privacy training, risk management, security training
Posted in Information Security | No Comments »
Tuesday, January 6th, 2009
There were over 1.2 million Twitter users in December and the numbers of users are growing exponentially.
(more…)
Tags:awareness and training, Information Security, IT compliance, IT training, micro-blog, policies and procedures, privacy training, risk management, security training, twitter
Posted in Information Security, Privacy and Compliance | No Comments »
Tuesday, January 6th, 2009
Yesterday Twitter reported here and here that several (33 to be exact) Twitter accounts were hacked into. This is in addition to the current, but separate, Twitter phishing…otherwise known as “twishing“…exploit that is simulatenously going on.
(more…)
Tags:awareness and training, Barack Obama, Britney Spears, hacker, Information Security, IT compliance, IT training, policies and procedures, privacy training, risk management, security training, twitter
Posted in Information Security, Privacy Incidents | No Comments »
Tuesday, December 30th, 2008
This summer I had planned to do a dumpster-diving project with my sons, but then the Iowa floods postponed those plans. However, after reading the following I’m motivated to plan to do this in the spring after basketball and G&T activities are finished for the winter…
(more…)
Tags:awareness and training, data disposal, HHS, HIPAA, Information Security, IT compliance, IT training, patient privacy, PHI, policies and procedures, privacy training, risk management, security training
Posted in Information Security, Privacy and Compliance, Privacy Incidents | No Comments »
Monday, December 29th, 2008
Okay, this story begs the question, why didn’t someone at the Naval Research Laboratory notice disappearing equipment…?
(more…)
Tags:awareness and training, computer crime, crminal, Information Security, insider threat, IT compliance, IT training, Naval Research Laboratory, policies and procedures, privacy training, risk management, security training, theft, Victor Papagno
Posted in government, Information Security, Lost & Stolen Laptops | 2 Comments »