Items Tagged with "breaches"


706d1ad00b38ceb640723d26ebbb5b77

Healthcare Data Breach Response Best Practices

October 30, 2011 Added by:Christine Arevalo

Taking a PHI inventory, establishing an Incident Response Plan, meeting patients' real needs, and looking for the positive aspects of a data breach can all reflect your culture of commitment and caring. And that's the best practice of all...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI and the Insider Threat

October 24, 2011 Added by:PCI Guru

The biggest problem with the insider threat is that it does not matter how much technology you have to protect your assets as it only takes one person in the right place to neutralize every last bit of your security solutions. Just ask anyone any of the recently breached organizations...

Comments  (0)

34f0cf280cbc950bcb75cabd189b7a8d

Webinar: How to Minimize the Risks of a Data Breach

October 21, 2011 Added by:Kanguru Solutions

Kanguru Solutions has teamed up with Cyber Data Risk Managers LLC to host a FREE webinar on cyber security and infosec entitled “How to Minimize the Risks of a Data Breach/Cyber Attack.” This free webinar will discuss data security, privacy and measures to take in the event of a data breach...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Operation DarkNet: A Good Start, But There is More to Do

October 20, 2011 Added by:Infosec Island Admin

Due to the nature of the site and its being in the hidden wiki (DarkNet) it is tough to know exactly where the systems sit that house/host the content, but, it seems that through certain techniques using TTL, they pretty much have a good idea of where the server may sit in the continental US.

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Impact: The Biggest Security Breaches of All Time

October 17, 2011 Added by:Headlines

While 2011 may be the year of the breach, the record for overall breach impact is still held by credit card payment processor Heartland Payment Systems with over 130 million accounts affected and costs in the neighborhood of seven billion dollars...

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Notes on the 2011 Verizon Breach Report

October 07, 2011 Added by:PCI Guru

Breaches occur because organizations get sloppy and, even with defense in depth in their security, there are too many controls where execution consistency has dropped leaving gaping holes in the various levels of security. However, once addressed, attackers will find other ways in...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Protecting Your Privacy Is Your Responsibility

October 02, 2011 Added by:Allan Pratt, MBA

Do you wonder what happens with your financial information when a background check is conducted for a job? Do you wonder what happens to your driver’s license information when you’re asked to provide it on a medical form? Truth is, you’re the only one who can safeguard your privacy...

Comments  (1)

8b5e0b54dfecaa052afa016cd32b9837

Legal Consequences of Breaches to Security and Privacy

October 01, 2011 Added by:Craig S Wright

Intermediaries have the ability to stop transgressions on the Web now, but the lack of clear direction and potential liability associated with action remains insufficient to modify behavior. In the face of tortuous liability, the economic impact of inaction is unlikely to lead to change...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Data Breaches - Beyond the Impact of Fines

September 27, 2011 Added by:Emmett Jorgensen

With several high profile breaches this year, regulators have proposed data breach notification bills and heavy fines for organizations that fail to keep sensitive information safe. The real concern for organizations that have experienced a data breach, however, is customer confidence...

Comments  (8)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Blumenthal Bill Bumps Up Fines for Security Breaches

September 18, 2011 Added by:David Navetta

Richard Blumenthal (D-CT) introduced bill that would levy significant penalties for identify theft and other “violations of data privacy and security,” criminalize software that collects “sensitive personally identifiable information” without clear and conspicuous notice and consent...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)

58bc13ef5da5ac4fc32d41c3fbc0e460

The Leaking Vault 2011: Six Years of Data Breaches

September 15, 2011

The Leaking Vault 2011 presents data gathered from studying 3,765 publicly disclosed data breach incidents, and is the largest study of its kind to date. Information was gleaned from the organizations that track these events, as well as government sources...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

HHS to Start Auditing For HIPAA Compliance

September 14, 2011 Added by:Emmett Jorgensen

Despite both HIPAA and the HiTECH Act, healthcare data breaches have been popping up regularly. A recent study found over 70% of hospitals had data breaches last year. This has generated concern over Healthcare’s adoption of security procedures and the overall effectiveness of HIPAA...

Comments  (4)

37d5f81e2277051bc17116221040d51c

How is All This Hacking Affecting My Identity?

September 13, 2011 Added by:Robert Siciliano

With so many different breeds of hackers, each with their own agenda, the media has certainly been more than willing to give them all the attention they could possibly want. Much of it has been sensationalist, but the reality is that we are indeed hemorrhaging information all over the place...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

WikiLeaks: An Insider's Perspective

September 08, 2011 Added by:John Linkous

Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California Amends Data Breach Law - For Real This Time

September 07, 2011 Added by:David Navetta

SB 24 requires the inclusion of certain content in data breach notifications, including a description of the incident, the type of information breached, the time of the breach, and toll-free telephone numbers and addresses of the major credit reporting agencies in California...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »