Blog Posts Tagged with "Personally Identifiable Information"

959779642e6e758563e80b5d83150a9f

Ten Steps to Protect Your Organization's Data

January 13, 2012 Added by:Danny Lieberman

Despite claims that protecting data assets is strategic to an enterprise, and IT governance talk about business alignment and adding value – my experience is that most organizations will not do anything until they’ve had a fraud or data security event...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Do Subpoenas Trump HIPAA or Trample Security of PHI?

January 12, 2012 Added by:Rebecca Herold

I’ve spoken to many business leaders over the years, and most have gotten serious about ensuring safeguards are in place when putting their signatures on attestations and other types of legally binding documents. So, you need to have documented procedures in place...

Comments  (0)

3750d420f6c2a9844b529978894dc0be

Gamers: Hackers Latest Hot Target

December 18, 2011 Added by:Josh Shaul

If you are a gamer and you use any online gaming network or service, please be vigilant and cautious. Don't click on any offer that comes in via email, and don't signing up for anything gaming related unless you are doing so direct from the software manufacturer or gaming network...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Are Your Health Records at Risk?

December 14, 2011 Added by:Christopher Burgess

Have we now arrived at the point in obtaining medical care that in addition to looking into the medical practitioner's experience and confirming they are compliant with HIPAA, that we now must review their data handling policies before choosing a health care provider?

Comments  (0)

3750d420f6c2a9844b529978894dc0be

Steam Attack Puts Users at Risk of Spear Phishing

November 15, 2011 Added by:Josh Shaul

A good implementation of salting before hashing can yield very secure results – however weak implementations that used fixed salt are not all that unusual, and those are quite easy to break. The stored credit card numbers were encrypted. It’s likely that these will be difficult to extract...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

The Credit Score Ripple Effect on Your Identity

November 08, 2011 Added by:Kelly Colgan

The Wall Street Journal reports that “the proliferation of ‘scores’ highlights the widening trade in personal information, which is already fueling public concern about diminishing personal privacy...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Rethinking Sensitive Information - Social Security Numbers

November 05, 2011 Added by:Rafal Los

Public and private entities have proven that a single nine-digit number as the gateway to our identities is not appropriate. Data breaches and identity theft cost organizations billions - perhaps we need to push the government to come up with a new way of verifying citizenship?

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Google Yourself: Ego-Surfing Can Help Protect You

November 03, 2011 Added by:Kelly Colgan

It’s clear that the information that’s readily available about a person — your so-called digital footprint — matters. Even Internet users who are careful about what they disclose online still must contend with the X factor: the information that other people post about them...

Comments  (0)

Ebbcdce0dfc85abf519d8b44a017f687

Latest Data Breach Costs Could Exceed $5 Billion

October 31, 2011 Added by:Brian Dean

It is recommended that organizations receiving PII become intimately familiar with all of the applicable security requirements for their industry in order to understand minimum protection requirements, industry best practices, as well as the consequences of noncompliance...

Comments  (0)

706d1ad00b38ceb640723d26ebbb5b77

Healthcare Data Breach Response Best Practices

October 30, 2011 Added by:Christine Arevalo

Taking a PHI inventory, establishing an Incident Response Plan, meeting patients' real needs, and looking for the positive aspects of a data breach can all reflect your culture of commitment and caring. And that's the best practice of all...

Comments  (0)

1156f97fa8f23821bd838fe7d9283d90

How FERPA Compares to HIPAA

October 26, 2011 Added by:David Sopata

Even through HIPAA has been around since 1995 it really had not gained momentum until the past few years when fines started being issued. However, there is a privacy law that has been on the books for much longer than HIPAA and it is the Family Educational Rights and Privacy Act or FERPA...

Comments  (0)

1156f97fa8f23821bd838fe7d9283d90

Multi-Function Printers and Security Beyond Compliance

October 20, 2011 Added by:David Sopata

Compliance in many cases is one of the biggest drivers for security. Compliance may not exactly require you to secure your Multi-Function printers or other devices, but since most organization generally want to do the right thing, it may be required to go beyond compliance...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Protecting Your Privacy Is Your Responsibility

October 02, 2011 Added by:Allan Pratt, MBA

Do you wonder what happens with your financial information when a background check is conducted for a job? Do you wonder what happens to your driver’s license information when you’re asked to provide it on a medical form? Truth is, you’re the only one who can safeguard your privacy...

Comments  (1)

15058930cc374dcfa98c0342a08be0b2

Security Trends: Which to Avoid and Which to Embrace

September 30, 2011 Added by:Ken Stasiak

With Enterprise Risk Management (ERM) comes a comprehensive risk assessment equation and process. Defining one process that can be used and incorporated into the entire organization will allow for conformity, efficiency, and effective alignment between departments...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Financial Analyst Fined And Jailed for Data Breach

September 30, 2011 Added by:Headlines

Rebollo was arrested in 2008 after an investigation revealed that he had downloaded, possessed, and sold consumer information contained in Countrywide databases. Rebollo distributed financial information and contact information pertaining to approximately 2.5 million individuals...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Blumenthal Bill Bumps Up Fines for Security Breaches

September 18, 2011 Added by:David Navetta

Richard Blumenthal (D-CT) introduced bill that would levy significant penalties for identify theft and other “violations of data privacy and security,” criminalize software that collects “sensitive personally identifiable information” without clear and conspicuous notice and consent...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »