Offense is Sexy. Defense Wins the Game

What do all team champions have in common?  It doesn’t matter if we’re talking about football, baseball, basketball, hockey, soccer, cricket or just about any other team sport.  With few exceptions, the champion is extraordinarily competent at both offense and defense. Think about healthcare.  Offense is a given.  There are frequent C-Suite discussions about new…

Risk Assessment Is Imperative – Avoid Small Breaches Becoming Huge Penalties

Although risk assessment continues to be a priority in health care organizations, there are several breaches occurring in small health organizations that have resulted in hefty penalties. Privacy protection is a growing concern and despite stringent laws governing data security, medical institutions are experiencing challenges in safeguarding patient information. The lack of a current and  thorough…

Top Tips to be GRC-Ready in 2011

According to industry experts, 2011 is the year when IT firms will realize that expensive risk management and compliance solutions may not provide the desired levels of security. Integration and alignment of disparate compliance initiatives for enhanced security controls will therefore assume immense importance. Chris Mclean, Forrester research analyst, in his report Governance, Risk and…

7 Facilities in California Fined for Privacy Breaches

Privacy protection is a growing concern for organizations despite stringent laws governing data security. Medical institutions especially are experiencing challenges in safeguarding patient information. A number of data breaches have been reported in the HIPAA healthcare industry so far. And the most recent addition to this is six hospitals and a nursing home being fined…

A Wake-Up Call for IT Security: Are Your Compliance Practices Fit for the Test?

The present IT environment is complex in nature, and much more than a handful of technical people operating and controlling systems with a few virus prevention tools. The complexity has increased manifold with a growing number of security threats being identified everyday. The security of confidential data is under question with potential risks from malicious…

Best Practices for Threat management

‘Cyber security threats’ is now the core topic of discussion amongst enterprises and will continue to be in the coming years. This is because security concerns have assumed unimaginable dimensions in the past years, posing a major challenge to the survival of businesses. Hence enterprises are now focusing more on curbing threats and making their…

Common Attack Techniques – In an Era of Industrialized Hacking

Gone are the days when hackers attacked perimeter defences. Today their objective is to take control of confidential data and the applications which process them. Hacking is now an operation involving global coordination, sophisticated techniques and persistent teamwork. And with clear roles and responsibilities being defined in the community, hacking is now a highly organized,…