Information Security Policies
Information security policies – Whoo hoo! Pretty exciting stuff! But seriously, if we didn’t have policies, where would we be? Civilization as we know it would cease to exist! We all have policies that we adhere to – personally, professionally, morally. (more…)
HIPAA Gap Assessment
Let’s talk about HIPAA Gap Assessments. First of all, what is it? HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA (not HIPPA) requires organizations that handle electronic protected health information (another abbreviation for you: ePHI) to ensure that this information (more…)
New Year’s Resolutions for 2012
It’s that time of year again! Yay! (more…)
PCI Compliance – It’s not just for today
Read an article recently on study that was comparing organizations that had achieved PCI Compliance, but that when re-visited a year later, had fallen out of compliance. (more…)
In the event of a breach…
Saw a great WSJ article recently on steps to take if you’ve been breached. Well written! Here’s the Cliff Notes version: (more…)
Consumer Loyalty and Data Breaches
A recent article on darkreading.com showed results of a survey on consumer loyalty and data breaches called SailPoint Market Pulse Survey, conducted online by Harris Interactive. (more…)
Who’s Storing Your Sensitive Data?
In the spirit of keeping sensitive data safe, and our private lives private, I was a little disturbed by a recent article I found on Wired News. They are referencing a newly released Dept. of Justice (DoJ) memo which outlines the retention periods for major Telecoms on data they’re storing about your: texting – detail/content; IP session and destination information; call details, (more…)
Systems and Architecture Review
Systems and Architecture Review. So, you’re feeling pretty confident that you’ve got your environment locked down. Are you certain your infrastructure, servers, and devices deployed throughout your organization are protecting the confidentiality, integrity, and availability of your sensitive information assets? (more…)
Logging, logging and more logging – configuring logging
OK, any Information Security professional knows that logging is very important. Here are some best practices that we subscribe to in configuring logging: (more…)
BET24 warns over data breach – 19 months later
As reported by The Register (http://www.theregister.co.uk/2011/07/26/bet24_security_breach/), online gambling site BET24.com notified customers on Monday of data breach that occured in December, 2009. (more…)