Theft of confidential information is a risk to the business and IT plays a large role in protecting the data. Not all data is electronic though. Files that identify customers and employees, Social Security numbers, credit card information and other account data are just some of the forms of sensitive data a company must protect. Failing to protect confidential information can lead to identify … [Read more...]
Are Companies Tightening the IT Belt Too Much?
The current economic environment has caused many IT departments to tighten their belts. But have they taken it too far? Do they risk not being able to meet the present and future needs of the business for the sake of cutting the bottom line or even put the company at risk? A recent survey commissioned by Microsoft and done by Harris Interactive reveals that American IT departments plan to spend … [Read more...]
Cisco Expands Security Services Into the Cloud
Cisco today announced new additions to its portfolio that bolster the network security infrastructure and the delivery of cloud security services, thereby enabling businesses to collaborate with greater confidence even as their workforce and partners become increasingly mobile and interactive. Today's announcement, being made at the RSA Conference in San Francisco, comes at a time when … [Read more...]
RSA President Urges “Inventive Collaboration” to Combat Cyber-Threat and Reap Rewards of New Technologies
During the opening keynote at RSA Conference Art Coviello, President of RSA, The Security Division of EMC cautioned that the global cyber-threat continues to escalate and online fraudsters are more organized, collaborative and effective than ever. He addressed major forces such as the economy and emerging technologies that are driving the information security industry to evolve and adapt – and … [Read more...]
Configuresoft IT and Systems Expert Authors SANS ITIL Certification Course
Configuresoft, Inc., a leading provider of enterprise server configuration management solutions, today announced that Configuresoft Director of Corporate Strategy and recognized expert in IT configuration and systems architecture George Gerchow, ITIL, CISSP, CCNA, MCPS, SCP, has authored an intensive, accelerated course in ITIL for security management for the highly-regarded SANS (SysAdmin, Audit, … [Read more...]
Lack of End User Training is a Large and Growing Threat to IT Security
While information security remains a top priority for eight in ten IT professionals surveyed, many companies seem to be underestimating one of the most significant IT security threats - end user error. According to CompTIA's 7th Annual Trends in Information Security survey, human error is the primary cause of the most severe security breaches, yet significantly fewer organizations (45%) provided … [Read more...]
The Top 20 Most Critical Controls for Cyber Security
A consortium of federal agencies and private organizations have released Version 1.0 of the Consensus Audit Guidelines (CAG) that define the most critical security controls to protect federal and contractor information and information systems. For each of the 20 controls, the experts identified specific (actual) attacks that the control stops or mitigates, illuminated best practices in … [Read more...]
IT PCG Research Reveals Significant Savings Potential for Information Security and Audit
The IT Policy Compliance Group (IT PCG), of which ISACA is a sponsor, today announced the availability of its latest benchmark research report titled, “Managing Spend on Information Security and Audit to Improve Results.” Based on research conducted with more than 2,600 firms, the study reveals that 68 percent of firms are under-spending on information security relative to the financial risks … [Read more...]