Your recent article referred to the patchwork of federal and state laws and regulations regarding corporate obligations to provide information security appear to becoming together to provide ever expanding coverage of corporate activity. Could you tell us more about these recent developments?
First question we have for you is how is the role of an information security officer evolving and what advice would you give to concurrent security officers or IT professionals who aspire to the ISO rule?
JOYCE BROCAGLIA: Well what I can tell you is that in over two decades what Iâ€™ve been doing recruiting it...
A new study details the psychological games and other tactics cyber criminals use in social engineering scams propagated through junk email. In a recently released study titled "Mind Games," Dr. James Blascovich, Professor of Psychology at the University of California,
The deadline of June 30th has come and gone, and thousands of companies have demonstrated that they are incapable of complying with a set of security guidelines to prevent data breaches and protect credit card data against identity theft. These security guidelines are from the Payment Card Industry (PCI).
As an employee at yourÂ institution, youâ€™re a cog in the great wheel that makes everything run. Youâ€™ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
When you think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart...the list seems to just keep getting longer.
Are you a trusting person? When dealing with people you don't know, don't give them sensitive information unless you're sure who they are, and can prove that they are who they say they are. You'll want to ask yourself if they should have access to the information.
Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
With the headlines announcing almost on a weekly basis another data breach at businesses, educational institutions and medical facilities, a recent study shows consumers are modifying their purchasing behavior, including online buying, out of concern for the security of their personal information.
The "2007 Consumer...
As the compliance date set for June 30, 2007 has passed, thousands of companies have yet to show that they are in compliance with the Payment Card Industry Data Security Standards (PCI-DSS). The Payment Card Industry set that date for all organizations that store, process or transmit credit card payments were to be...
No matter who the vendor is, or how long theyâ€™ve supplied their service or item to your institution, you need a written contract. Even the company who supplies your bottled water needs a simple form contract.
Sensitive financial information is leaking from financial institutions, vendors and customers according to a recent study on the risks from inadvertent disclosures of sensitive information on the Internet.