An Authoritative Compliance Security for an Unwavering Presence

As per the 2011 Data Breach Investigations Report (DBIR) released by Verizon there has been a considerable drop in the number of compromised records- from 361 million in 2008 to 144 million in 2009 and less than 4 million in 2010. Security breach incidents have reduced to 1% in the healthcare sector while the hospitality…

Cignet Pays A Heavy Price for HIPAA Violation!

A recent incident of HIPAA violation has reinforced the need for health care organizations to focus on creating and keeping the records efficiently for easy access; most do not create the records in the first place!  If they have not, the  tendency has been to subdue their responsibilities towards enforcement of security compliance measures with…

Top Tips to be GRC-Ready in 2011

According to industry experts, 2011 is the year when IT firms will realize that expensive risk management and compliance solutions may not provide the desired levels of security. Integration and alignment of disparate compliance initiatives for enhanced security controls will therefore assume immense importance. Chris Mclean, Forrester research analyst, in his report Governance, Risk and…

Vulnerability Management: Secured IT, Assured Success

According to GartnerG2 (now Gartner Industry Advisory Services) a research unit of Gartner, 90% of cyber attacks leverage known security flaws and vulnerabilities, for which patches are already available. Gartner analysts also believe that several security attacks could have been avoided if organizations had focused more on vulnerability management efforts. Effective vulnerability management is therefore…

7 Facilities in California Fined for Privacy Breaches

Privacy protection is a growing concern for organizations despite stringent laws governing data security. Medical institutions especially are experiencing challenges in safeguarding patient information. A number of data breaches have been reported in the HIPAA healthcare industry so far. And the most recent addition to this is six hospitals and a nursing home being fined…

A Wake-Up Call for IT Security: Are Your Compliance Practices Fit for the Test?

The present IT environment is complex in nature, and much more than a handful of technical people operating and controlling systems with a few virus prevention tools. The complexity has increased manifold with a growing number of security threats being identified everyday. The security of confidential data is under question with potential risks from malicious…

Best Practices for Threat management

‘Cyber security threats’ is now the core topic of discussion amongst enterprises and will continue to be in the coming years. This is because security concerns have assumed unimaginable dimensions in the past years, posing a major challenge to the survival of businesses. Hence enterprises are now focusing more on curbing threats and making their…

Is Your File Data at Risk?

According to market analyst firm IDC, file data accounts for nearly 80% of business data and has been growing at a rate of 60% every year. With such overwhelming growth in the volume of sensitive data files, persistent insider threats and complex regulatory mandates for data protection, there is immense pressure on organizations to secure…