Data Breach, Vulnerability Testing & Management

Another Data Breach…

Launching Part One of Practical Security Series: Scenarios

Recently the University of Maryland was the victim of a sophisticated computer security attack, or hacking incident, that involved the breach of a significant database at the University. This breach may have exposed the records of over 309,000 faculty members, staff members, students, and other affiliated personnel from some of the University’s campuses.

Once again, similar to far too many other data breach events, the breached information included Social Security Numbers, or SSNs. While the University is offering free credit monitoring to those affected, anyone who has endured an identity theft incident knows that the inconvenience is far more extensive than twenty dollars and one year of credit monitoring.

While it may take the incident forensic specialists, and their recently doubled IT Security Staff (self-claimed), some time to determine the root cause, the actual and total information breached, and whether procedural or technical reasons permitted the breach to happen, the incident as a whole serves to remind us that we all must be continually diligent.

Continued diligence involves assessing your own organization, and your data security controls in an authorized and controlled manner. Unauthorized parties are assessing your security controls on a constant basis. The benefit to performing your own assessment, such as a Technical Vulnerability Assessment, is that you are privy to the results. When a “hacker” assesses your controls the only results you may receive, or maybe not, is success or failure of their efforts.

RISC Management & Consulting specializes in data privacy and information security regulations and frameworks,  visit our website for details call:  800.648.4358

Education, Tip of the Week, Upcoming Events

HIMSS14 Online Starts Monday February 24th

Register now for HIMSS14 Online — sessions start this Monday

There’s nothing like being able to participate and listen to live simulcast of keynotes and education sessions. I enjoyed the education sessions last year as much as hearing the keynote speaker, however if time is of the essence the virtual world is the answer.

If short in time, I recommend the Securing Patient Data in a Mobilized World:

To get us started, RISC Management and Consulting, is hosting a Five Part Practical Security Series. RISC will describe common scenarios and solutions we have experienced across a large segment of organizations.

See you in Orlando, Florida

Rose Rienton MSN, BSN