The SANS Institute released a report earlier this year on Insider Threats and the Need for Fast and Directed Response. The report talks about the importance of recognizing insider threats, whether accidental or intentional, why they occur and their implications, which often are more dire than external attacks alone.
Being compliant does not mean your organization is safe, nor does it mean that your organization is immune to repercussions at the hands of a data breach. In an article on CSO Online, Compliant does not equal protection: our false sense of security, I discuss the nuances of regulatory compliance and how, while important in driving protection standards, they could lead to complacency in setting security standards.
While we have seen many organizations in the healthcare industry with mature security postures, as a whole the healthcare industry continues to struggle with security. According to the latest release of Digital’s Building Security in Maturity Model (BSIMM6), the healthcare industry lags behind other sectors when it comes to software security.
HIPAA regulations have continued to challenge healthcare organizations across the country, exposing major cracks in the foundation of healthcare data security processes. Healthcare organizations have the greatest number of data security challenges of any industry, as the top target for cyber attacks with highly complicated healthcare networks, a growing amount of electronic healthcare records and an increasingly mobile workforce.
Microsoft is preparing to launch the new Surface Pro 4, a tablet aimed to replace the laptop, and the new Surface Book, an ultra-thin laptop. Both devices will be released on October 26th in North America, with much hype about the benefits of the laptop-tablet hybrid of the Surface Pro 4 and its benefit as a business device. In anticipation of these new releases, Absolute announced support for both the Surface Pro 4 and the Surface Book.
At NYIT’s Annual Cybersecurity Conference 2015 recently, experts from industry, government and academia gathered to discuss the state of cybersecurity and the growing threat of data loss from mobile devices. As with many discussions on the topic, it is clear that cyber attacks are coming at an accelerating pace, targeting the valuable and increasingly mobile data accumulating within organizations. Although all agree that it’s important to “get ahead of the curve,” to prevent attacks, it is just as important to remain resilient.
Roger A. Grimes recently wrote an excellent opinion piece for InfoWorld on how fear-driven responses lead to misaligned security preparedness. The No. 1 problem with computer security addresses the need for a data-driven security plan, one that focuses on real security threat information and not what is sensationalized in […]
What will your next data breach do to your business? This is a question I ask readers of Information Age, where I contributed an article on the importance of understanding the impact of a data breach. An understanding of the risks and consequences of a data breach is key to planning appropriate security measures.