As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.
This webinar...
The timing of two new watchdog reports that highlight the need to protect the security of electronic health records could help build momentum for action, some observers say.
"Our ability to provide immediate response to vulnerabilities and threats ... is quickly establishing VA as a model of excellence for the rest of the federal government."
VA CIO Roger Baker says in testimony before a House panel.
Tips for Preventing Fraud and Complying With FFIEC Guidance
The onslaught of ACH/wire fraud incidents confirms what the researchers have long said: We're in a new wave of malicious code. This new wave is run by organized crime, and it's focused on one objective: Stealing personally identifiable information and...
The non-standardized collection device is responsible for 13 percent of the biometric records maintained by DOD, representing some 630,000 DoD records that cannot be searched automatically against FBI's database of about 94 million records.
Government agencies continue to see growing cybersecurity challenges. Software Security Assurance (SSA) is a new approach entities are taking to improve security measures in their organizations. A critical component of SSA are threat assessments, which involve accurately identifying and characterizing potential...
"Without improvements, the weaknesses identified may limit program and site-level officials' ability to make informed risk-based decisions that support the protection of classified information and the systems on which it resides," says Rickey R. Hass, deputy inspector general for audits and inspections.
Attackers could leverage vulnerabilities to gain control of air traffic control systems, with intruders using unprotected computers to compromise other systems that depend on the same network, a Transportation Department audit reveals.
The Social Security Administration sold the information in a database of deceased individuals that erroneous contained the Social Security numbers, dates of birth, full names and ZIP codes of living people, the inspector general reports.
Institutions must enhance their security infrastructure and protect their customers' data in order to keep up with the demands of new and more stringent regulations. But how do you select the right providers for your institution to ensure compliance in your next audit?
This webinar will present:
The Five Habits...
"A security breach of one of these systems or projects could have a severe to catastrophic adverse effect on NASA operations, assets or personnel," an inspector general's IT audit says.
Mobile devices have forced a radical shift in the way organizations service their customers. Financial institutions are no exception to the pressure of extending their online services to the mobile channel. By 2015 mobile banking could reach one in five adults in the United States. But the growth in mobile devices has...
Auditors find that the SEC's IT office documented and incorporated National Institute of Standards and Technology patch requirements in its policies and procedures but that guidance wasn't always followed.
Government auditors gave the Federal Deposit Insurance Corp. a sort of a pat on the back of a job well done in plugging holes in its IT security regarding the FDIC's financial systems.
Until the IRS corrects the identified weaknesses, its financial systems and information remain unnecessarily vulnerable to insider threats, including errors or mistakes and fraudulent or malevolent acts by insiders, GAO auditors says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.