1.888.749.9800

Monthly Archives: October 2013

Common mistakes in IT security risk assessments

ICS-risk-assessment2Dark Reading put together an article focused on common mistakes organizations make when running IT security risk assessments.  Included below was my response and the Dark Reading article is posted here.

  • Trying to do too much.  One of the most common mistakes is trying […]
By |October 21st, 2013|Blog|Comments Off on Common mistakes in IT security risk assessments
  • Permalink Gallery

    10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

October 17, 2013 — Dark Reading

As IT organizations seek to make better risk-based decisions about security practices, perhaps the No. 1 component for success is the IT risk assessment. However, even when organizations actually conduct a risk assessment, they frequently fall prey to mistakes that can greatly devalue the exercise. Here are some of the most common blunders to […]

By |October 18th, 2013|News & Events|Comments Off on 10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson
  • Permalink Gallery

    Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

October 2013 — SearchHealthIT – TechTarget

Affordable Care Act implementation continues, despite some major obstacles: a government shutdown, deep political opposition to the ACA, and a rocky start to the first week of enrollment for its health insurance exchanges (because of initial crashes of the main federal website and ongoing technical glitches causing delays and user-authentication problems).

Mandated by the ACA, […]

By |October 17th, 2013|News & Events|Comments Off on Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Control of USB Storage Devices

USB storage devices are a convenient mechanism for users to store data locally or transport data from one system to another.  USB storage devices may include memory sticks, portable hard disks, smartphones, cameras, media players, and even auxiliary displays.

Historically some USB storage devices have contained autorun executable malicious code.  If an employee can be enticed to insert a USB […]

By |October 3rd, 2013|Blog|Comments Off on Control of USB Storage Devices