More regulatory oversight of HIPAA is coming. Are you ready?

The Office of Civil Rights has delayed the implementation of Phase 2 of the HIPAA audit program until 2015 due to complications with their new web portal.  While this may be a welcome reprieve from the threat of an OCR audit, you should use your time wisely.  Phase 2...

IT Security – be sure to lock the doors!

Physical security is an often overlooked aspect of IT security. Don’t let your company fail to enact the simplest security measures of all! According to the FFIEC IT Examination Handbook, physical security is an examined aspect of your network security posture....

SIEM – Going Beyond Log Management

Do you log all critical events?  Do you archive them somewhere? The best practice for maintaining log data integrity is to centrally store all pertinent log data somewhere isolated from your network. In the event of an intrusion or a malicious insider attack, the logs...

Three caught embezzling half million

Charges have been formally filed against three former employees of the Oahu Transit Services Employees Federal Credit Union who were recently charged with embezzling nearly $500,000 over several years. An investigation to the thefts determined the actions of each were...

Target Data Breach – Slowly Getting Back Consumer Confidence

As of February, Target began reporting that in-store traffic and retail sales had started to recover following the data breach which impacted up to 40 million cardholders during the holiday season. However, the company still has a long way to go before it will reach...

Where do your IT threats originate?

In 2012, the Ponemon Institute released its “Aftermath of a Data Breach Study”. Sponsored by Experian Data Breach Resolution, it examined what steps companies took to recover following a data breach associated with customer/consumer data. Its findings were comprised...