A key amendment to Canada's Personal Information Protection and Electronic Documents Act goes into effect on Nov. 1. What are the baseline standards for compliance, and how does this change impact risk transfer and mitigation? Charlie Groves of CrowdStrike shares his views.
Compliance regulations such as SWIFT and GDPR can be challenging to understand and implement. Many of these regulations have cybersecurity requirements that are focused on protecting critical banking infrastructure with aggressive timelines - and without disrupting the very business-critical systems you're trying to...
We are amid a data explosion that has created unique challenges and opportunities for organizations across industries. Mountains of machine data from disparate systems can make it difficult, costly and time intensive to manage and secure IT assets. But with the right solutions, organizations can reduce costs, optimize...
The European Union's (EU's) General Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal . The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the past; they...
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
The European Union's new data protection enforcement is prompting a rethink about data handling in Australia, which has had a casual approach to privacy, says Brian Fletcher, Symantec's director of government affairs in Asia Pacific.
Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.
The EU's General Data Protection Regulation, which will be enforced beginning May 25, has significant implications for how financial institutions worldwide handle customer data, says Brett King, CEO of Moven, an all-digital bank, who sizes up the challenges.
There are massive amounts of vulnerabilities that companies deal with on an ongoing basis - not everything is lost though. Organizations that use unpatched software face a race against the clock, with attackers regularly beginning to hammer new vulnerabilities just hours after new fixes or security alerts get released...
Time is running out. You've heard that costly penalties will be assessed for companies that have been slow to comply with GDPR in late May of 2018. But GDPR should not be viewed as only 'another regulation'. Coming to compliance with GDPR is an opportunity to build trust with consumers as it lays out the privacy...
At its core, compliance for HIPAA is simply about maintaining patient privacy by ensuring your users appropriately access and use patient data. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed.
The challenge, however, is the lack of visibility into what users do with...
The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to
look at two-factor and multi-factor solutions to accomplish the goal. Clearly, the addition of second and third factors addresses the need. However, in the process, security professionals often...
The beauty of the cloud is that it's possible to expand capabilities like short-term capacity or long-term backups quickly and without the costly infrastructure and additional employees associated with on-premise equipment.
Unfortunately, many organizations are discovering their cloud environments are unattended...
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
IT administrators and business partners require privileged access to enterprise networks to ensure that business continues to get done. Yet this very same access is all too often abused by insiders and outsiders, leading to otherwise preventable data breaches, says Matt Dircks, CEO of Bomgar.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.