Top Tips to be GRC-Ready in 2011

According to industry experts, 2011 is the year when IT firms will realize that expensive risk management and compliance solutions may not provide the desired levels of security. Integration and alignment of disparate compliance initiatives for enhanced security controls will therefore assume immense importance. Chris Mclean, Forrester research analyst, in his report Governance, Risk and…

Federal Health Care Reform- What they Mean to Public CIOs

The technological implications of the Federal Health Care Reform are now becoming obvious, and states are beginning to confront the burden of implementing these changes. While extending health insurance to an additional 32 million Americans presents great opportunities for the state government, it also brings with it, big risks. And these risks are mainly associated…

Vulnerability Management: Secured IT, Assured Success

According to GartnerG2 (now Gartner Industry Advisory Services) a research unit of Gartner, 90% of cyber attacks leverage known security flaws and vulnerabilities, for which patches are already available. Gartner analysts also believe that several security attacks could have been avoided if organizations had focused more on vulnerability management efforts. Effective vulnerability management is therefore…

A Wake-Up Call for IT Security: Are Your Compliance Practices Fit for the Test?

The present IT environment is complex in nature, and much more than a handful of technical people operating and controlling systems with a few virus prevention tools. The complexity has increased manifold with a growing number of security threats being identified everyday. The security of confidential data is under question with potential risks from malicious…

Best Practices for Threat management

‘Cyber security threats’ is now the core topic of discussion amongst enterprises and will continue to be in the coming years. This is because security concerns have assumed unimaginable dimensions in the past years, posing a major challenge to the survival of businesses. Hence enterprises are now focusing more on curbing threats and making their…

Choosing the Right Vendor for Your Business

Keeping your security system up-to-date is highly crucial. Hence it is always a good idea to partner with a security service vendor, who can help fulfill your security needs. In this context, it is important to understand that selecting a suitable vendor is just as significant as choosing the right software tools with the right…

AG’s Office Scores Settlement for Unparalleled Security Breach: First of its Kind

The first action by a state Attorney General for violation of HIPAA (after HITECH authorized State Attorneys General to enforce HIPAA) has resulted in an unprecedented money settlement with the AG’s office. The case involved unreported loss of a compact disk by Health Net containing private medical records, social security numbers and financial information. While…

Your Company needs Information Security Monitoring and Integrated GRC

Did you know : Approximately 500 million records containing personal identifying information of United States residents stored in government and corporate databases was either lost or stolen in the last 5 years? Various other corporations lost US$1 Trillion worldwide as a result of data loss, accidental or malicious? Costs from the largest computer data breach…