Every week…sometimes daily…it seems there is a new type of social engineering attack targeting specific groups. The social engineering fraudsters are pretty creative and many adept at exploiting the vulnerabilities and weaknesses of these groups. They use face-to-face methods, phone calls, email messages, faxes, and any other communication path that could take them to a willing victim.
Posts Tagged ‘IT compliance’
Laws, Standards, Mapping, and HIPAA
Friday, June 22nd, 2007Today is the last day of Norwich University’s Masters programs residency week; this afternoon is graduation.
It has been a great week…I have loved chatting with the students and faculty, and I’ve compiled a page full of topics I want to research and blog about!
Norwich University Residency Week & Thoughts On the Court Ruling on Email Searches
Thursday, June 21st, 2007I’m a professor for the Norwich University MSIA program, and since Sunday I’ve been here in Vermont for their residency week, culminating in graduation on Friday. It has been a great week! It kicked off with a wonderfully thought-provoking discussion led by Karen Worstell, former CISO for Microsoft, as well as former CEO at AtomicTangerine, and many other high-profile positions.
On The Internet, If It Looks, Quacks and Walks Like a Duck, Is It *REALLY* a Duck?
Wednesday, June 20th, 2007I am a great believer of performing due diligence to ensure potential new hires have no deceptive or malicious skeletons in their past that may be reincarnated after they have been hired and entrusted with access to sensitive information and supporting resources. There are appropriate times organizations should do criminal background checks, education checks, and other checks as appropriate and legal for the position being filled and the location of the facility.
Medical Identity Theft and Bill Requiring Criminal Background Checks In LTC Facilities
Tuesday, June 19th, 2007I have had relatives very close to me who, because of degenerative diseases and medical problems, have had to go to long term care (LTC) facilities. I always worried about the care they were receiving when I was not around. I worried that others would not be caring for them in a truly caring and kind way. I worried that people who had been convicted of violent crimes and financial fraud might try to take advantage of them and the others in the facility. I tried to keep a close watch on them.
Another Study Supports The Need for Awareness and Executive Support
Monday, June 18th, 2007I’m always interested to read survey results related to information assurance. Of course the readers need to take the interpretations and summaries with a grain of salt; very few surveys are statistically representative of all organizations.
Another Fun Security Awareness Site
Friday, June 15th, 2007Here’s another great security awareness site pointed out by Dave Ockwell-Jenner in the Security Catalyst community:
the Security Cartoon site.
You Can Never Really Tell Who Gets Your Wireless Transmissions
Friday, June 15th, 2007It was interesting to read about an elementary school science teacher in a Chicago suburb whose baby monitor picks up the video transmission from inside the space shuttle Atlantis.
OMB Sets Security Configuration Contracts Language for Acquisitions
Wednesday, June 13th, 2007On June 1 the U.S. Office of Management and Budget (OMB) released recommended language for all federal government chief information officers for required common security configurations for Windows computer operating systems that should be included in acquisitions solicitations to information technology providers.