RiskIT Logo

Issue 42                                             Thursday, September 22, 2011 

 

Developing an Effective Security Strategy for Health Data

 

 

Regulations such as HIPAA and HITECH drive healthcare providers and payers to adopt information protection strategies. But adoption of consumer-facing electronic privacy is a mixed bag.

Join us to discuss some of the elements that make a good security strategy for the dissemination of health information.

To read this article in its entirety, please click:

Developing an Effective Security Strategy for Health Data

The Worst Security Hack Ever

 

Breach Extends Beyond the Victimized Company

 

The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.

 

Hackers broke into DigiNotar computers and stole the private key used by the Dutch company to assure the trustworthiness of the digital certificates it issued to website operators to guarantee us that the site visited is the one they intended to access.

 

  

To read this article in its entirety, please click:

The Worst Security Hack Ever

 

 

Risk Assessment Guide for Federal Information Systems

 

Risk assessment is the topic of the newest special publication from the National Institute of Standards and Technology (NIST).

 

Risk assessments can help federal agencies effectively evaluate the durrent threat, organizational and information system vulnerabilities, potential adverse impacts to core missions and business operations - using the results to determine appropriate risk responses.

  

To read this article in its entirety, please click:  

Risk Assessment Guide for Federal Information Systems

    

Cyber-Espionage Hits Defence Companies 

 

The victims in a big cyber-espionage operation linked by a leading researcher to China last month include US defence contractors ManTech and CACI International, adding to the long list of intelligence and military support companies whose security has been compromised.

The latest operation drew international attention after it was described in a research paper published in early August by Dmitri Alperovich as Shady RAT after the hacking technology known as a remote access tool.

To read this article in its entirety, please click: 

 Cyber-Espionage Hits Defence Companies

 

Signals of PC Failure and Contingency Plans
  

Has your computer ever refused to turn on when you hit the power button? Or maybe it turned on, but only to display a blue screen?

 

The best (really the worst) is when you've been working on a document or presentation all day, and your hard drive crashes.

 

If this has yet to happen to you, you're likely overdue. The following signs indicate your computer may be close to death.

 

  

To read this article in its entirety, please click:

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List