Many incidents occur through access control and authentication vulnerabilities. Just consider the recently reported Fruit of a Loom incident that allowed easy access to 1,006 names and Social Security numbers of former employees. It is likely poorly constructed and inadequately tested applications controls resulted in this breach, not unlike so many other breaches that have occurred.
Posts Tagged ‘FFIEC’
Addressing Web-Based Access and Authentication Challenges
Friday, March 2nd, 2007Regulatory Compliance Actions Must Include Effective, ongoing Awareness and Training Efforts
Friday, December 29th, 2006A great article was published on Law.com today written by Ryan Sulkin, “First Line of Defense Against Data Security Breaches: Employees.”
There are several points made that I hope business leaders read and take to heart.