Insider Threat, the Value of Computer Logs & the Need for Consistent Policy...
In recent years many organizations have implemented the use of computer logs on their networks to be in compliance with multiple laws. However, here’s a perfect example of the value of computer logs...
View ArticleCalifornia Privacy Breach Law Changes Go Into Effect January 1, 2008:...
California’s privacy breach notification law SB1386 started the ball rolling with regard to what is now at least 40 U.S. states, including the District of Columbia, that have breach notice laws. Most...
View ArticleBe Aware: Court Ruling Allows Circumstantial Evidence In Court Case Against...
So many times…actually almost every time…a privacy breach occurs the company that experienced the breach makes a public statement similar to, “We have no evidence that the personal information has been...
View ArticleBe Aware: Court Ruling Allows Circumstantial Evidence In Court Case Against...
So many times…actually almost every time…a privacy breach occurs the company that experienced the breach makes a public statement similar to, “We have no evidence that the personal information has been...
View ArticleAnd The Award For Best Email Security Awareness Film of 2007 Goes To…
I’ve been seeing a ton of articles and blog postings for the “Best Security Whatever> of 2007,” “Worst Security Exploits of 2007,” “Security Projections for 2008″ and so on in the past few weeks....
View ArticleFTC Settlement For Marketing Via Pop-up Ads: Lessons For All Marketers...
I like to keep my eye on the FTC site; they are very active in catching businesses violating the U.S. FTC Act by practicing unfair and deceptive business practices, particularly via the Internet. They...
View ArticleFDIC Releases Updated IT Officer’s Risk Management Program Questionnaire
Last week the U.S. Federal Deposit Insurance Corporation (FDIC) released an updated version of their IT officer’s risk management program questionnaire for banks and financial organizations to use to...
View ArticleThe 3 Necessary Elements for Effective Information Security Management
Seeing all these really bad information security incidents and privacy breaches, often daily, are so disappointing. Let’s consider these four in particular. The Sony hack that seems to continue to get...
View ArticleAddressing Mobile Risks in 2015
Last week fellow IBM Midsize blogger Jason Hannula wrote about Gartner’s prediction that by 2018 more than 50% of all folks will use their mobile computing devices in the workplace before, or instead...
View Article
More Pages to Explore .....