Sixty percent (60%) of organizations surveyed acknowledge that data loss is a recurring problem, according to Accenture’s study on “How Global Organizations Approach the Challenge of Protecting Personal Data.” The study reminds us that “data privacy and protection shortcomings can do irreparable harm to companies’ balance sheets, not to mention their brands, credibility and customer trust and relationships.” We’ve seen this, some of us have experienced it. This knowledge however should not paralyze us but galvanize us into action to create programs and security initiatives that create a culture of security and protect our customer’s personal data, daily. We need to ensure that we are in continuous compliance with data privacy laws. We owe it to our customers, we owe it to our board members and we owe it to ourselves.
(more…)Category: Uncategorized
-
One Man’s Trash
(more…)
One Man’s Trash… is another man’s access into your secure environment. -
Webinar – Vendor Management
Thanks to all that were able to attend our webinar today on Vendor Management. Also thanks to Denis O’Neil and presenter, Heath Stanley, for contributing such a hot button topic. Our webinar series fall on the 1st Friday of each month and next month (April 2nd @ 11am CST) we will be discussing ‘Enterprise Risk Management’.
(more…) -
A Sleeper Risk in Information Security Programs: Third Party Data Recovery

Just when you thought it was safe to tell your Board, external auditors, or examiners that you have a “no surprises” information security program in place, you don’t! There is a significant “sleeper risk” in the information security program of most organizations and government agencies that has been overlooked! It is a very small aspect of day-to-day operations in the scheme of the organization’s priorities, which is why it has gone unnoticed – until now. As one regulator commented to me recently, “this is not a potential problem – it is a real problem.” It can create a huge risk with a huge downside, if it is not controlled. Most organizations don’t even realize that this “sleeper risk” exists, until it is too late. The good news is that once you identify this “sleeper risk,” it is easy to fix.
“What is this sleeper risk?” It is the lack of information security protocols and practices in the vetting, selecting, and use of data recovery service providers.
(more…) -
‘Crossover’ malcode could jump from PC to handheld
From SearchSecurity.Com….
(more…) -
The Value of Collaboration
Just recently a news headline screamed “Customers flock to iPhone banking!” I immediately thought the only way a bank could do this is through collaboration and
(more…)
partnering with third parties. Institutions that fail to understand this are leaving money on the table. After a recent chat with a financial institution I fear that many are still missing the new markets, new offerings and new bottom-line that collaboration delivers.



