Until the IRS corrects the identified weaknesses, its financial systems and information remain unnecessarily vulnerable to insider threats, including errors or mistakes and fraudulent or malevolent acts by insiders, GAO auditors says.
Nearly 8 of 10 hard drives tested contained tax returns, Social Security numbers, names of children placed in foster homes, passwords and child abuse documentation, an audit by New Jersey authorities reveals.
Homeland Security's U.S. Citizenship and Immigration Services IT systems are vulnerable to insider threats, according to a report by the Insider Threat Center at CERT, part of the Software Engineering Institute at Carnegie Mellon University.
The latest Government Accountability Office report reflects the complexity of securing key IT systems: The administration has come far the past two years, but much more work remains to be done to secure effectively the nation's critical information infrastructure.
HealthcareInfoSecurity.com will provide in-depth coverage of privacy and security issues at the Healthcare Information and Management Systems Society Conference next week.
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
As David Blumenthal, M.D., prepares to step down as National Coordinator for Health Information Technology, it's a good time to assess the privacy and security issues that his successor must address.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.
"Until the missing elements are addressed," the GAO audit said, "there is an increased risk that smart grid implementations will not be secure as otherwise possible."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.