RiskIT Logo

Issue 31                                                     Thursday, July 7, 2011 

 

How High Performance Organizations Manage IT 

 

 

This new report from the IT Policy Compliance Group describes how high-performance organizations are using IT as a competitive advantage to generate more capital to invest in acquiring new customers and markets, reducing their capital and operating expenses, and at the same time significantly reducing risk related to the use of IT. Results from the research indicate...

To read this article in its entirety, please click:

How High Performance Organizations Manage IT

WellPoint Settles Over Data Breach

 

  

Indiana to Receive $100,000 for Restitution

 

 

Health insurer WellPoint Inc. has reached a settlement with the Indiana Attorney General's office over a delayed notification about a consumer data breach that affected the records of 32,051 people.

 

WellPoint will pay the state $100,000 for an incident that allowed personal information of thousands of customers to be potentially accessible over the Internet, according to a press release posted by the attorney general. The exposed data included social security numbers, financial information and health records.

 

 

To read this article in its entirety, please click:

 
 

 

 

 

 

Risk Management and Compliance - Finally Coming Together?

 

   

No one has been able to escape the news and numerous commentaries on the recent high profile breaches.

Evidently, hackers are no longer lonely teenagers in their back room trying to impress their friends: today's cybercrime industry has evolved and automated itself to improve efficiency, scalability, and profitability with a clear intent on obtaining information that can be monetised.

 

 

With the Internet as their superhighway, they have no boundaries. Perversely, the hackers' best friends are those very same businesses with their inadequate and often outdated information security practices, as well as those very individuals whose identities end up being stolen - particularly when they don't keep their antivirus and firewalls up to date and don't check the privacy settings on the many social networking sites they frequent, or fall prey to phishing attacks!


To read this article in its entirety, please click:

Risk Management and Compliance - Finally Coming Together?

 

Virtualization Can't Guarantee Data Availability

 

Virtualization platforms such as those from VMware, Microsoft and Citrix can provide for advances in high availability (HA) for most enterprises. By extending this concept to non-company-owned server systems, cloud solutions can add even more options for server uptime in the event of either a single-server or multi-system disaster. However, HA solutions that focus on immediate recovery of the system state of a failed virtual machine (VM) can lead to problems when VM definition is just fine, but data is lost, whatever the reason.

To read this article in its entirety, please click: 

Virtualization Can't Guarantee Data Availability
Data Breaches Are Up While Lost Records Are Down

 

    

According to a recent report from Verizon, data breaches are on the rise. There were 760 data breaches recorded in 2010, compared to 140 breaches in 2009.

However, there were approximately four million records stolen in 2010, as opposed to 144 million stolen in 2009.

This means there were fewer large-scale data breaches comprised of multimillions of records, and many more data breaches that compromised fewer records at a time.

To read this article in its entirety, please click: 

 Data Breaches Are Up While Lost Records Are Down

 

 

 

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List