When managers commit financial fraud, their schemes tend to cost organizations twice as much as when non-managers instigate these crimes. That's one key finding of a new insider fraud study.
Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.
Playing by the rules is tough if the rules aren't available. That's why it's essential that federal authorities release a long list of pending regulations that affect privacy and security.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
Occupational fraud is quite possibly the largest form of fraud, says John Warren of the ACFE. So how can organizations spot the potential fraudsters and prevent their crimes? Warren shares insights.
An Obama administration memo, issued by U.S. Special Counsel Carolyn Lerner, cautions federal agencies that interfering with e-mails used by government employees to unveil misconduct could be unlawful.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.
The lack of common definitions, understandings and approaches among countries may hamper international cooperation on cybersecurity, a need acknowledged by most countries.
The latest spin on the insider threat: malicious outsiders taking advantage of inadvertent insiders, says Dawn Cappelli of Carnegie Mellon University. Learn how to detect and prevent these attacks.
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
NIST's latest guidance adds controls that reflect the rapidly changing computing environment, but the fundamentals of implementing controls haven't changed, Senior Fellow Ross says in a video interview.
Organizations are urged to adopt six principles to avoid the perils of transferring IT decision making away from technology specialists to business unit leaders.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.