Fraud is a global concern, and an area regulators and financial institutions the world-over are watching closely, says Bill Isaac. Whether a cyberthreat or mortgage fraud, investments in fraud prevention will continue, despite the state of the international economy.
Preliminary results of our inaugural Healthcare Information Security Today survey, which is still open for participation, show that only about half of healthcare organizations have a plan in place to comply with the HITECH Act breach notification rule.
As of Aug. 22, 306 major health information breaches affecting a total of almost 11.7 million individuals were included in the official federal tally. Fourteen incidents affecting a total of about 270,000 were added since July 22.
In order to comply with regulatory obligations all financial organizations should encrypt sensitive and confidential data anywhere it might be found or sent. But the ROI is not just compliance. Encryption can not only provide a solid defense against data breaches, but it can generate a positive return and create new...
A Georgia man has entered a guilty plea in a hacking case that involved freezing the computer operations of a pharmaceutical company earlier this year.
A consumer advocacy group is calling attention to a little-known fact about seven federal breach notification bills pending in Congress: They would leave certain healthcare information unprotected.
The Health Net Inc. breach that was believed to have affected about 2 million individuals may be larger than originally stated, according to new information from the insurer.
Just over a month after Citigroup confirmed a breach of its online banking platform, a second breach affecting Citi customers has come to light, this time in Japan.
Ian Harper of Pentagon Federal Credit Union says financial institutions should continually review their risk management processes, a recommendation reinforced by the new FFIEC Authentication Guidance.
Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.
What Operation Shady RAT reminds us is not just how vulnerable our IT systems are, but how interconnected we are as a global society, and the fundamental role information technology plays.
"The timing and the targets point to China," says cybersecurity policy expert James Lewis. "Spying right before the Beijing Olympics and focusing on Southeast Asia reflects China's larger interests more than those of any other country."
Organizations taking proper preventative measures realize a cost savings of nearly 25 percent over those that don't, an analysis of a survey sponsored by Hewlett-Packard reveals. Still, the study shows, it takes longer to resolve cyberattacks than it did a year ago.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.