creditcard swipe


                            

creditcard and key
Monthly NewsLetter
Issue: April 2010
About

Many of you have recently been added to our Compliance, Security and GRC NewsLetter mailing list. This is informational news comprising the latest on Compliance related topics and other IT Security & Governance updates that we will be providing to all of you periodically. If you have a good article to share for future editions , please email to [email protected]
 
Gonzalez Gets 20 Years in Hacker Case
 
Miami based Gonzalez was recently sentenced to 20 years in prison for his role in the theft and sale of millions of credit and debit cards from Heartland Payment Systems and other retailers.
 
Albert Gonzalez is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007.  He had three federal indictments. [More]
In This Issue
- Gonzalez Gets 20 Years in Hacker Case
- HITECH Act - Breaches Affecting 500 or More Individuals
- Open source and free log analysis and log management tools
Quick Links
Join our emailing list!
creditcard swipe
HITECH Act - Breaches Affecting 500 or More Individuals 
 
The Health Information Technology for Economic and Clinical Health (HITECH) Act was signed into law on February 17, 2009, to promote the adoption and meaningful use of health information technology.
 
Section 13402(e)(4) of the HITECH Act, requires that the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. The latest list of entries can be found on the website of the Department of Health and Human Services (HHS). [List]
Open source and free log analysis and log management tools
 
Many security and regulatory compliance require collection, storage, maintenance and review of logs.  Routine log reviews and in-depth analysis of stored logs are beneficial for identifying security incidents, policy violations, fraudulent activity and operational problems.
 
Log data collection and analysis is considered a security industry "best practice" and can be achieved without requiring expensive and time-consuming software implementations. A number of free open-source log management and log analysis tools are available. [Free Tools] 
Please let us know any suggestions you may have. Also, please feel free to forward this to other people who would find this newsletter useful.
 
Sincerely,
 
ControlCase Team