RiskIT Logo

Issue 33                                                     Thursday, July 21, 2011 

 

Solving the End User Problem

 

 

In my previous five articles, we've explored how client security has gone horribly wrong at the hands of bad designs, poor choices, and the cover of marketing.

In order to provide too many conveniences for the end user, we've literally removed the doors, windows, burgler alarms and the police in the face of a changing threatscape.

While things may seem desperate, there are solutions that have helped, but still don't solve the problem.

For more information, please click:

Solving the End User Problem 

Disciplining IT Security Pros for Breaches

 

   

Holding CIOs, CISOs Accountable for Hacks on Their Watch is Rare

WIth all the recent news coverage about breaches, you rarely, if ever, read about an IT or IT security manager being disciplined in any fashion, let alone fired.

Executives - whether agency heads or corporate CEPs - might be disciplining technology managers responsible for IT security after a breach, but word about their pubishments doesn't leak out because of laws protecting employees' rights.

To read this article in its entirety, please click:

Disciplining IT Security Pros and Breaches

 

 

Protecting Medical Devices

 

New Consortium to Identify Best Practices

A new consortium is leading an effort to devise best practices for ensuring the security of networked medical devices.

The Medical Device Innovation, Safety and Security Consortium was formed because of the growing number of medical devices linked to networks and the growing risk of malicious hacking and malware, says Dale Nordenberg, M.D., founder.

Among the leaders of the consortium are the Department of Veterans Affairs, which has launched an ambitious medical device protection progran, and Kaiser Permanente.

 

To read this article in its entirety, please click: 

 

Protecting Medical Devices

Seven No-Cost Security Tune-Ups for Windows

 

    

Network World's Howard Wen has a nice writeup today on seven no-cost tune-up tools and tips to keep your Windows operating system secure.

The following recommendations are critical for users who suspect they may already be infectes with malware, spyware, trojans, or other malicious code, and are generally geared towards systems running Windows 7, Vista and XP.

A brief summary of Wen's recommendations are as follows:

 

To read this article in its entirety, please click: 

 Seven No-Cost Security Tune-Ups for Windows

 

Disaster Recovery Assurance: The Often Forgotten Factor in Data Protection Planning
 

When you think of data protection, what do you think of? I'll bet that you think of daily backup windows, resotre SLAs, tuning back-up systems, and off-site archiving. It is wasy for those every day tasks to dominate the data protection discussion. But maybe you should also think about data recovery - after all, when it comes right down to it, the only reason you back up all that data, night after night, week after week is so you can recover it!

 

To read this article in its entirety, please click:

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List