Institutions must enhance their security infrastructure and protect their customers' data in order to keep up with the demands of new and more stringent regulations. But how do you select the right providers for your institution to ensure compliance in your next audit?
This webinar will present:
The Five Habits...
"A security breach of one of these systems or projects could have a severe to catastrophic adverse effect on NASA operations, assets or personnel," an inspector general's IT audit says.
Mobile devices have forced a radical shift in the way organizations service their customers. Financial institutions are no exception to the pressure of extending their online services to the mobile channel. By 2015 mobile banking could reach one in five adults in the United States. But the growth in mobile devices has...
Auditors find that the SEC's IT office documented and incorporated National Institute of Standards and Technology patch requirements in its policies and procedures but that guidance wasn't always followed.
Government auditors gave the Federal Deposit Insurance Corp. a sort of a pat on the back of a job well done in plugging holes in its IT security regarding the FDIC's financial systems.
Until the IRS corrects the identified weaknesses, its financial systems and information remain unnecessarily vulnerable to insider threats, including errors or mistakes and fraudulent or malevolent acts by insiders, GAO auditors says.
Nearly 8 of 10 hard drives tested contained tax returns, Social Security numbers, names of children placed in foster homes, passwords and child abuse documentation, an audit by New Jersey authorities reveals.
Homeland Security's U.S. Citizenship and Immigration Services IT systems are vulnerable to insider threats, according to a report by the Insider Threat Center at CERT, part of the Software Engineering Institute at Carnegie Mellon University.
The latest Government Accountability Office report reflects the complexity of securing key IT systems: The administration has come far the past two years, but much more work remains to be done to secure effectively the nation's critical information infrastructure.
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.
Think your data is secure? Think again.
If you are sending data over a service provider's network, then you need to know: Current Wide Area Network (WAN) technologies offer no inherent data protection. It's time for you to take matters into your own hands to ensure your data is secure.
View this FREE webinar to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.