Items Tagged with "Best Practices"


Healthcare Data Breach Response Best Practices

October 30, 2011 Added by:Christine Arevalo

Taking a PHI inventory, establishing an Incident Response Plan, meeting patients' real needs, and looking for the positive aspects of a data breach can all reflect your culture of commitment and caring. And that's the best practice of all...

Comments  (0)


The Long-Term Impact of Short-Term Problems

July 21, 2011 Added by:Rafal Los

How long do you suppose it will be before one of these companies that's had a catastrophic, board-level security awakening forgets it ever happened and goes back to it's old practices of ignoring security? Six months? A year? Three years?

Comments  (0)


Risk Management and Compliance Part Two

July 14, 2011 Added by:Neira Jones

Being prepared remains the best defense against security breaches. As we have seen, organizations still remain slow in detecting and responding to incidents. Nearly two-thirds of breaches continue to be uncovered by external parties and then only after a considerable amount of time...

Comments  (0)


Infosec and Internal Audit Working Together

July 11, 2011 Added by:Robb Reck

The difference between security and internal audit is slight, but significant. We are both looking to address risk, but security is considered a part of the business, and audit must be an impartial third party. By working together both teams can become better at what they do...

Comments  (3)


Essentials for an FCPA Compliance Program

June 10, 2011 Added by:Thomas Fox

Ongoing monitoring, auditing and assessments need to go down to the individual employee level. There should be both a ‘carrot and stick’ approach so that employees are disciplined for compliance failures, but also rewarded for doing business through appropriate compliance avenues...

Comments  (1)


Ten Steps To A More Secure Password

May 31, 2011 Added by:Global Knowledge

I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...

Comments  (2)


NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)


Documentation and the TRACE Due Diligence Guidebook

March 12, 2011 Added by:Thomas Fox

Many companies focus on the specifics of a best practices FCPA compliance program, we believe they should also make documentation an over-arching principal in their compliance programs. Everything done or performed within the context of your FCPA compliance program should be documented...

Comments  (0)


Infosec Pro's Need to Practice What They Preach

March 10, 2011 Added by:Headlines

The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...

Comments  (0)


Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)


FCPA Risk Assessments and Current Best Practices

February 26, 2011 Added by:Thomas Fox

The key point is that a Risk Assessment is absolutely mandatory and must be used as a basis for the design of an effective compliance policy. If a Risk Assessment is not used, it might be well nigh impossible to argue that your compliance program meets even the basic standards...

Comments  (0)


On The Frontlines: Cloud Computing in Government

October 30, 2010 Added by:Kevin L. Jackson

Showcasing the positive progress of Federal Government Agencies and their strategic partners in meeting the goals of their Mission Programs. This issue, Cloud Computing in Government, features the Trends and Best Practices on Cloud Computing in Government...

Comments  (0)

From the Web

The Role of Worst Practices in Insecurity

December 11, 2009 from:

These days, security advisors talk a lot about Best Practices: establishes procedures that are generally held to yield good results. Deploy Best Practices in your organization, the advisors say, and your security will improve. That's true, as far as it goes, but often we can make more progress by working to eliminate Worst Practices.

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »