Blog Posts Tagged with "Policies and Procedures"

0a8cae998f9c51e3b3c0ccbaddf521aa

Landmark Ruling: Insiders Aren't Hacking if You Gave them Access

October 08, 2012 Added by:Rafal Los

What happens if you go perusing through your corporate file-share lists, applications directories and such... and find some interesting stuff that you aren't technically supposed to have access to yet the controls in place have no problem giving you permission? Does anyone notice?

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Trend Grows as Security Issues Escalate

October 07, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Revising Your Code of Conduct: Don’t Wait

September 30, 2012 Added by:Thomas Fox

The backbone of the revision process is how your company captures, collaborates and preserves “all of the comments, notes, edits and decisions during the entire project," and you should assess “the best application to launch your Code and whether it includes a certification process..."

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Ways to Minimize Reputational Risk with Social Media

September 26, 2012 Added by:Brent Huston

One of the most difficult tasks for an organization is conveying the importance of discretion for employees who use social media. Not only are organizations at risk from having their networks attacked, but they must protect their reputation and proprietary ideas...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal CIO Council Releases BYOD Toolkit

September 19, 2012 Added by:David Navetta

The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Compliance and Company Values from the Ground Up

September 17, 2012 Added by:Thomas Fox

For the compliance practitioner sometimes the biggest challenge is not only to get senior management but the troops in the trenches to embrace compliance. Cathy Choi's story is a powerful lesson of one way to get those troops to buy into what the compliance department is selling...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs Seek Value But See Challenges with Cloud Computing

September 16, 2012 Added by:Bill Gerneglia

The face of corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – the fact is that in the long run individual organizations will not have email server administrators, desktop software support personnel or systems administrators...

Comments  (0)

37d5f81e2277051bc17116221040d51c

BYOD: Mobile Security Tips for Small Businesses

September 16, 2012 Added by:Robert Siciliano

If you choose to use your personal device for work purposes, at any time, for any reason, your employer will more than likely want control over that device. This means that, again, your employer may have remote capabilities to monitor activity wipe your device’s data...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Seven Tips to Improve Patch Management

September 12, 2012 Added by:Dan Dieterle

The amount of time many companies spend on patching, the problems they have deploying patches, the perception that patching causes problems, and a general lack of understanding about what it takes to patch, all combine to make patching such a major issue...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Internally Funding Your Compliance Program

September 11, 2012 Added by:Thomas Fox

Big banks are not doing too well these days in the compliance arena. From money-laundering operations for drug cartels to trading losses, big banks seem to be more in the news these days for compliance failures rather than successes...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Leadership in the Compliance Department

September 05, 2012 Added by:Thomas Fox

While a leader can provide some insights based on experience, and perhaps give a different view, the employee who brought up the compliance issue will probably be more intimately involved with it. The employee may have thought through a resolution to the potential issue as well...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Understanding Your BYOD Policy

August 28, 2012 Added by:Robert Siciliano

If you choose to use your personal device for work, then your employer will more than likely want control over that device. This means like in a company mobile liability policy, the employer may have remote capabilities to monitor activity and in the event of loss or employee termination, wipe the data...

Comments  (0)

6462807771e81d9c33eb99307f5f3e77

Assessing Risk Management Culture to Better Understand the Characteristics of ERM Programs

August 27, 2012 Added by:Michele Westergaard

The past 24 months have seen a number of disasters bring risk management to the forefront of executives and board directors. Whether natural disasters such as the Japanese Tsunami or man-made such as the Gulf of Mexico oil spill, fat-tail disasters have created a renewed interest in enterprise risk management...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Messaging Mishaps Have Collateral Damage

August 21, 2012 Added by:Rebecca Herold

Bottom line for all organizations, from the largest to the smallest: You need to establish messaging policies that clearly communicate that all emails sent through the company email system are subject to monitoring, and that no one using the system should have any expectation of privacy for the messages...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Illinois Bars Employers from Obtaining Social Media Credentials

August 20, 2012 Added by:David Navetta

Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »