Quantcast
Channel: » information security policies
Browsing latest articles
Browse All 9 View Live

Insider Threat, the Value of Computer Logs & the Need for Consistent Policy...

In recent years many organizations have implemented the use of computer logs on their networks to be in compliance with multiple laws. However, here’s a perfect example of the value of computer logs...

View Article



California Privacy Breach Law Changes Go Into Effect January 1, 2008:...

California’s privacy breach notification law SB1386 started the ball rolling with regard to what is now at least 40 U.S. states, including the District of Columbia, that have breach notice laws. Most...

View Article

Be Aware: Court Ruling Allows Circumstantial Evidence In Court Case Against...

So many times…actually almost every time…a privacy breach occurs the company that experienced the breach makes a public statement similar to, “We have no evidence that the personal information has been...

View Article

Be Aware: Court Ruling Allows Circumstantial Evidence In Court Case Against...

So many times…actually almost every time…a privacy breach occurs the company that experienced the breach makes a public statement similar to, “We have no evidence that the personal information has been...

View Article

And The Award For Best Email Security Awareness Film of 2007 Goes To…

I’ve been seeing a ton of articles and blog postings for the “Best Security Whatever> of 2007,” “Worst Security Exploits of 2007,” “Security Projections for 2008″ and so on in the past few weeks....

View Article


FTC Settlement For Marketing Via Pop-up Ads: Lessons For All Marketers...

I like to keep my eye on the FTC site; they are very active in catching businesses violating the U.S. FTC Act by practicing unfair and deceptive business practices, particularly via the Internet. They...

View Article

FDIC Releases Updated IT Officer’s Risk Management Program Questionnaire

Last week the U.S. Federal Deposit Insurance Corporation (FDIC) released an updated version of their IT officer’s risk management program questionnaire for banks and financial organizations to use to...

View Article

Image may be NSFW.
Clik here to view.

The 3 Necessary Elements for Effective Information Security Management

Seeing all these really bad information security incidents and privacy breaches, often daily, are so disappointing.  Let’s consider these four in particular. The Sony hack that seems to continue to get...

View Article


Image may be NSFW.
Clik here to view.

Addressing Mobile Risks in 2015

Last week fellow IBM Midsize blogger Jason Hannula wrote about Gartner’s prediction that by 2018 more than 50% of all folks will use their mobile computing devices in the workplace before, or instead...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images