Posts Tagged ‘Computer security’

Symantec: SMBs Change Security Approach with Growing Threats

Image via CrunchBase By: Brian Prince A survey of small to midsize businesses from 28 different countries by Symantec found that companies are focusing more on information protection and backup and recovery. Driving these changes is a fear of losing data. Today’s small to midsize businesses (SMBs) are facing a growing threat from cyber-attacks, and […]

Leave a Comment

Internet security breach found at UCSF

Image via Wikipedia By Erin Allday, SF Chronicle Hackers may have had access to personal information for about 600 UCSF patients as a result of an Internet “phishing” scam, campus officials said Tuesday. The security breach occurred in September when a faculty physician in the UCSF School of Medicine provided a user name and password […]

Comments (2)

What is a risk assessment framework

Image by Adam Melancon via Flickr The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Definition – A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure. A good RAF organizes and presents information in a way that […]

Leave a Comment

Five ways to lose your identity

By Jaikumar Vijayan The rush by shoppers to the Web makes the season a great time for online retailers. It’s also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online. Checkout huge savings on Today’s Hot Deals on Information Security Solutions for […]

Comments (1)

Healthcare Organizations May Not Be Prepared for HITECH and Other Security Challenges

Healthcare Organizations May Not Be Prepared for HITECH and Other Security Challenges HIMSS News The Healthcare Information and Management Systems Society releases its 2nd Annual Security Survey, sponsored by Symantec CHICAGO (November 3, 2009) – With the American Recovery and Reinvestment Act underway, healthcare organizations face new challenges to maintain privacy and security of patient […]

Leave a Comment

Security controls and ISO 27002

Usually security breach occurs due to lack of basic security controls or lack of effective control which is not relevant over the time. Security controls also disintegrate over the time due to lack of maintenance and monitoring. According to Privacy Rights Clearinghouse survey, the top three breaches resulted from laptop theft, software or human error, […]

Comments (2)

Security breach and notification

Image by victoriabernal via Flickr California was the first state in the nation to pass a data breach notification law in 2003, and it’s now planning to broaden the notification for companies doing business in the state. Notification will require specific information about the breach to the consumer and send notices to the state authorities […]

Comments (4)

Cloud computing and security

Cloud computing provide common business applications online that run from web browser and is comprised of virtual servers located over the internet. Main concern for security and privacy of user is who has access to their data at various cloud computing locations and what will happen if their data is exposed to an unauthorized user. […]

Comments (1)

Cybersecurity and congressional hearing

Cybersecurity experts were at congress floor this week to discuss security strategy and threats to federal government infrastructure for not having an appropriate strategy and funding. “Where are we today in cyber security? From one perspective, we are in remarkably bad shape. In the last year, we have seen the networks of the two Presidential […]

Leave a Comment

Small business and assessment of IT risks

According to a study released by European Union ENISA, Small-to-Medium-Sized (SME) enterprises require extra guidance in assessment of IT security risks of their assets. Agency also established that in the first implementation it is improbable that SME can utilize a risk assessment & risk management approach without external assistance and simplified information security approach was […]

Leave a Comment