RiskIT Logo

Issue 49                                             Friday, November 11, 2011 

 

How to Improve Network Security on a Limited Federal Budget

 

It's the common challenge: Federal budgets are level-funded or cut. But as critical data becomes ever-more mobile and regulatory mandates grow, how do you use your limited resources to actually improve your agency's network security?

 

 

To read this article in its entirety, please click:

How to Improve Network Security on a Limited Federal Budget

New Survey: Compliance is Job #1 in 2012

 

Healthcare Info Security Survey Outlines Unfinished Business

 

Improving regulatory compliance efforts is the No. 1 information security priority for healthcare organizations in the year ahead. That's a key finding of the inaugural Healthcare Information Security Today survey.

 

Healthcare Info Security conducted the online survey of information security professionals and other senior executives, whcih was sponsored by Diebold and Experian Data Breach Resolution. A full report on all the results, featuring in-depth analysis, is now available.

 

  

To read this article in its entirety, please click:

New Survey: Compliance is Job #1 in 2012

 

 

How to Secure a Moving Target with Limited Resources

 

This white paper outlines the limitations of traditional defense mechanisms; specifically, how cybercriminals have refined the malware manufacturing and development process to systematically bypass them - thereby initiating an arms race with defenders. Security patches are found to be a primary and effective means to escape this arms race as they remediate the root cause of the compromise. However, timely patching of the software portfolio of any organization is like chasing a continually moving target.

 

To read this article in its entirety, please click:  

How to Secure a Moving Target with Limited Resources

    

OCR Starts HIPAA Privacy Audits

 

The HHS Office for Civil Rights during November will begin HIPAA audits to assess covered entities' compliance with the privacy, security and breach notification rules. In general, OCR will use resulting audit reports from KPMG to determine types of technical assistance that should be developed and what types of corrective actions are most effective.

"Should an audit report indicate a serious compliance issue, OCR may initiate a complaince review to address the problem," according to the office. OCR will not post a listing of audited entries or the findings of an individual audit which clearly identifies the audited entry.

To read this article in its entirety, please click: 

 OCR Starts HIPAA Privacy Audits

 

Employment Opportunity: Two Experienced, Certified IT Auditors Needed
  

Eminere Group is looking for two experienced, certified IT Auditors. Please click on the link below for the listing of Open Positions, as well as the Responsibilities and Requirements for these positons.

 

  

Please click:

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List