Blog Posts Tagged with "Personally Identifiable Information"


Ten Steps to Protect Your Organization's Data

January 13, 2012 Added by:Danny Lieberman

Despite claims that protecting data assets is strategic to an enterprise, and IT governance talk about business alignment and adding value – my experience is that most organizations will not do anything until they’ve had a fraud or data security event...

Comments  (0)


Do Subpoenas Trump HIPAA or Trample Security of PHI?

January 12, 2012 Added by:Rebecca Herold

I’ve spoken to many business leaders over the years, and most have gotten serious about ensuring safeguards are in place when putting their signatures on attestations and other types of legally binding documents. So, you need to have documented procedures in place...

Comments  (0)


Gamers: Hackers Latest Hot Target

December 18, 2011 Added by:Josh Shaul

If you are a gamer and you use any online gaming network or service, please be vigilant and cautious. Don't click on any offer that comes in via email, and don't signing up for anything gaming related unless you are doing so direct from the software manufacturer or gaming network...

Comments  (0)


Are Your Health Records at Risk?

December 14, 2011 Added by:Christopher Burgess

Have we now arrived at the point in obtaining medical care that in addition to looking into the medical practitioner's experience and confirming they are compliant with HIPAA, that we now must review their data handling policies before choosing a health care provider?

Comments  (0)


Steam Attack Puts Users at Risk of Spear Phishing

November 15, 2011 Added by:Josh Shaul

A good implementation of salting before hashing can yield very secure results – however weak implementations that used fixed salt are not all that unusual, and those are quite easy to break. The stored credit card numbers were encrypted. It’s likely that these will be difficult to extract...

Comments  (0)


The Credit Score Ripple Effect on Your Identity

November 08, 2011 Added by:Kelly Colgan

The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...

Comments  (0)


Rethinking Sensitive Information - Social Security Numbers

November 05, 2011 Added by:Rafal Los

Public and private entities have proven that a single nine-digit number as the gateway to our identities is not appropriate. Data breaches and identity theft cost organizations billions - perhaps we need to push the government to come up with a new way of verifying citizenship?

Comments  (1)


Google Yourself: Ego-Surfing Can Help Protect You

November 03, 2011 Added by:Kelly Colgan

It’s clear that the information that’s readily available about a person — your so-called digital footprint — matters. Even Internet users who are careful about what they disclose online still must contend with the X factor: the information that other people post about them...

Comments  (0)


Latest Data Breach Costs Could Exceed $5 Billion

October 31, 2011 Added by:Brian Dean

It is recommended that organizations receiving PII become intimately familiar with all of the applicable security requirements for their industry in order to understand minimum protection requirements, industry best practices, as well as the consequences of noncompliance...

Comments  (0)


Healthcare Data Breach Response Best Practices

October 30, 2011 Added by:Christine Arevalo

Taking a PHI inventory, establishing an Incident Response Plan, meeting patients' real needs, and looking for the positive aspects of a data breach can all reflect your culture of commitment and caring. And that's the best practice of all...

Comments  (0)


How FERPA Compares to HIPAA

October 26, 2011 Added by:David Sopata

Even through HIPAA has been around since 1995 it really had not gained momentum until the past few years when fines started being issued. However, there is a privacy law that has been on the books for much longer than HIPAA and it is the Family Educational Rights and Privacy Act or FERPA...

Comments  (0)


Multi-Function Printers and Security Beyond Compliance

October 20, 2011 Added by:David Sopata

Compliance in many cases is one of the biggest drivers for security. Compliance may not exactly require you to secure your Multi-Function printers or other devices, but since most organization generally want to do the right thing, it may be required to go beyond compliance...

Comments  (1)


Protecting Your Privacy Is Your Responsibility

October 02, 2011 Added by:Allan Pratt, MBA

Do you wonder what happens with your financial information when a background check is conducted for a job? Do you wonder what happens to your driver’s license information when you’re asked to provide it on a medical form? Truth is, you’re the only one who can safeguard your privacy...

Comments  (1)


Security Trends: Which to Avoid and Which to Embrace

September 30, 2011 Added by:Ken Stasiak

With Enterprise Risk Management (ERM) comes a comprehensive risk assessment equation and process. Defining one process that can be used and incorporated into the entire organization will allow for conformity, efficiency, and effective alignment between departments...

Comments  (0)


Financial Analyst Fined And Jailed for Data Breach

September 30, 2011 Added by:Headlines

Rebollo was arrested in 2008 after an investigation revealed that he had downloaded, possessed, and sold consumer information contained in Countrywide databases. Rebollo distributed financial information and contact information pertaining to approximately 2.5 million individuals...

Comments  (0)


Blumenthal Bill Bumps Up Fines for Security Breaches

September 18, 2011 Added by:David Navetta

Richard Blumenthal (D-CT) introduced bill that would levy significant penalties for identify theft and other “violations of data privacy and security,” criminalize software that collects “sensitive personally identifiable information” without clear and conspicuous notice and consent...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »