There is a familiar theme in all security breaches, regardless of scale: careless oversight and failure to act proactively. Let these cautionary tales help ensure your organization does not fall victim to cyber criminals who will always exploit those who fail to...
The Office of Civil Rights has delayed the implementation of Phase 2 of the HIPAA audit program until 2015 due to complications with their new web portal. While this may be a welcome reprieve from the threat of an OCR audit, you should use your time wisely. Phase 2...
Physical security is an often overlooked aspect of IT security. Don’t let your company fail to enact the simplest security measures of all! According to the FFIEC IT Examination Handbook, physical security is an examined aspect of your network security posture....
Do you log all critical events? Do you archive them somewhere? The best practice for maintaining log data integrity is to centrally store all pertinent log data somewhere isolated from your network. In the event of an intrusion or a malicious insider attack, the logs...
Charges have been formally filed against three former employees of the Oahu Transit Services Employees Federal Credit Union who were recently charged with embezzling nearly $500,000 over several years. An investigation to the thefts determined the actions of each were...
As of February, Target began reporting that in-store traffic and retail sales had started to recover following the data breach which impacted up to 40 million cardholders during the holiday season. However, the company still has a long way to go before it will reach...