Should information security safeguards be assigned to individuals based on their risky behavior? Continue reading
By Ron Stamp, NYSTEC Information Security Consultant
Many organizations today are involved with collecting and processing Personal Identifying Information (PII) or Personal Health Information (PHI). Because it’s crucial that such data is protected and handled properly, regulating agencies are requiring System Security Plans (SSPs) to be completed. Continue reading
Back in 2014, JP Morgan was one of 12 financial institutions hacked by cybercriminals who stole personal information from more than 100 million customers. The hackers didn’t use the stolen data for identity theft. Instead, they used it to push penny stocks in what amounted to multimillion dollar “pump and dump” schemes.
Such high-profile crimes can be a wake-up call for businesses to reevaluate their cybersecurity protocols. See the 10 Lessons Learned from a Major Security Breach slideshow at CIO Insight.
Disclaimer: The link to this content is provided because it has information that may be useful. NYSTEC does not warrant the accuracy of any information contained in the link and neither endorses nor intends to promote the advertising of the resources listed therein. The opinions and statements contained in such resources are those of the author and do not necessarily represent the opinions of NYSTEC.
As business processes and their supporting Information Technology (IT) systems become more important to public and private entities, the requirements for an effective Business Continuity/Disaster Recovery (BC/DR) program are becoming more critical. There are many factors to consider when developing an effective BC/DR program. The checklist below can help you get started. Continue reading