NACHA has posted an alert about a targeted phishing scam that appears to be hitting recipients up for ACH transaction details. Reports of phishing e-mails appearing to be from the Internal Revenue Service have also cropped up this week.
After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
"The trend here is the level of fines that the regulators are putting out there," says Tony Wicks, AML and fraud-detection expert. "$7 million does not sound that great, but for the size of an institution like Pacific National, it is substantial."
Former New York State CISO Will Pelgrin is expanding his influence over information security nationwide as chief executive officer of the newly revised Center for Internet Security that encompasses MS-ISAC and the U.S. Cyber Challenge.
Physicians implementing electronic health records should consider cloud computing as a way to improve security, says healthcare IT consultant Patricia Dodgen.
Three recent breach incidents, each involving the loss or theft of back-up drives, illustrate that some organizations are doing a better job than others in informing consumers about the steps they're taking to prevent more breaches.
"A security breach of one of these systems or projects could have a severe to catastrophic adverse effect on NASA operations, assets or personnel," an inspector general's IT audit says.
Although many organizations are using encryption to protect data on mobile devices, they're often overlooking other important ways to prevent health information breaches, says Terrell Herzig, information security officer at UAB Medicine.
While Japan's nuclear emergency puts local citizens at risk, there is much that organizations globally can learn from the crisis. "I hope that all of us look at this and ask 'What can I do to be better prepared?'" says Regina Phelps, disaster recovery expert.
India's data protection standards are strong. But to be truly secure, organizations must protect themselves above those standards, says Dr. Kamlesh Bajaj, CEO of the Data Security Council of India.
A comprehensive bill to dramatically change the way the federal government addresses cybersecurity could pass the Senate as early as this summer, Sen. Thomas Carper, who chairs a Senate panel with IT security oversight, says in an interview with GovInfoSecurity.com.
Enforcing standards for privacy and security is a major part of a new health information exchange accreditation program, says Lee Barrett, executive director of the Electronic Healthcare Network Accreditation Commission.
Cybersecurity threats are growing exponentially, but preparedness varies by country, says Philip Victor of the International Multilateral Partnership Against Cyber Threats, located in Malaysia.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.