What to do in the case of a cyber security related emergency

In the event you have a cyber security related emergency, there are some simple, immediate steps you can take to help get the situation under control and preserve evidence for investigation.  Most incidents can be classified as a malware compromise, a data compromise, or computer misuse.  Each of these types of incidents require immediate action […]

Rate this:

, , ,

Leave a comment

Role of the Board of Directors in Information Security and Compliance

Guest Blogger Barry Schrager. I recently read a posting “Where’s the Compliance Experience on Corporate Boards?” [i] which showed some disturbing results describing the backgrounds of the Fortune 500 Board Members in terms of Compliance.  Here are the results:  Background No. of Board Members No. of Companies       Finance 1,583 473     […]

Rate this:

, , , , ,

1 Comment

PCI Security Standards Council publishes third-party security assurance guidance

The PCI Security Standards Council and a PCI Special Interest Group (SIG) consisting of merchants, banks and third-party service providers have produced an information supplement which provides recommendations for meeting PCI Data Security Standard (PCI DSS) requirement 12.8 and helps to ensure payment data and systems entrusted to third parties are maintained in a secure […]

Rate this:

, , ,

Leave a comment

What IT Users and Business Users Think about Bring Your Own Identity (BYOID)

Ponemon Institute has released its CA Technologies sponsored study “The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).  They surveyed 1,589 IT and IT security practitioners and 1,526 business users with more than 1,000 employees in United States, Australia, Brazil, Canada, France, Germany, India, […]

Rate this:

, , , , , ,

Leave a comment

Information Commissioners Office provides data protection advice to the legal profession

The Information Commissioner’s Office (ICO) is warning barristers and solicitors to keep personal information secure, especially paper files. This follows a number of data breaches reported to the ICO involving the legal profession. The ICO can serve a monetary penalty of up to £500,000 for a serious breach of the Data Protection Act provided the […]

Rate this:

, , , , , , , , ,

Leave a comment

Point of Sale Malware and the 7 stages of an attack.

Rate this:

, , , , ,

Leave a comment

Why is there a Cloud Multiplier effect on the risk of a Data Breach?

Rate this:

, , ,

Leave a comment

Follow

Get every new post delivered to your Inbox.

Join 1,385 other followers