Spread of the pandemic influenza A (H1N1) "Swine flu" virus is thought to be happening in the same way that seasonal flu spreads. Flu viruses are spread mainly from person to person through coughing or sneezing by people with influenza. Sometimes people may become infected by touching something with flu viruses on it...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Nearly every organization is required to have a Business Continuity Plan. Yet, planners often overlook issues related to resource allocation -- the "people, places and things" necessary for business continuity. Register for this webinar for case studies and insight on how to:
Identify and describe the components...
A Business Impact Analysis (BIA) is an integral part of developing a Business Continuity Plan for any type of disaster, and the Federal Financial Institutions Examination Council (FFIEC) has released recent guidance about enhancements to the BIA and testing discussions.
According to the latest update to the FFIEC's...
Think the pandemic threat isn't real, or that you needn't prepare a thorough plan to account for it? Your organization's regulators disagree. Pandemic planning is a significant regulatory requirement for every financial institution and a key component in government agency requirements. Register for this webinar to...
From payment card fraud to skimming attacks and corporate account takeover, we've seen a wide variety of threats to banking institutions and their customers.
And with the advent of the ID Theft Red Flags Rule, and in the aftermath of the economic upheaval, we know banking regulators are paying closer attention to...
Just because you aren't directly offshoring any of your core systems or processes doesn't mean your third-party service provider isn't.
It's a given that most organization's outsource critical functions - particularly technology - as a means to reduce IT expense. Yet, even if organizations outsource these functions...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.