article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

In a 2003 interview Mitnick claimed he never used stolen information or destroyed data during his hacks. Instead of trying to address risks, it was easier to try to punish the person exposing them. However, he also knew that there will always be new attacks, and he dedicated his career to educate us all to be less vulnerable.

article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

Since 2003, there have been over 331,100 complaints that were handled by the Office for Civil Rights. Failure to Conduct Regular Risk Assessments Regular risk assessments are important in protecting health information under the HIPAA. Using these risk assessments, they can become proactive in addressing the risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Employees are often compelled to jump through automated, bureaucratic hoops when actual security is at stake – with manual human interference and education coming into play only when there is a compliance box to be checked off. Compliance Comes Down to Risk Management.

article thumbnail

Attacks Targeting Oil and Gas Sector Renew Questions About Cybersecurity

Hunton Privacy

Nevertheless, growing risks are leading to calls for mandatory oil and gas pipeline cybersecurity regulations. However, there are important differences between the electric grid and pipeline system, most notably in the risk of cascading impacts, that may distinguish the appropriateness of regulations that set a baseline for cybersecurity.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

It covers seven security domains: security operations and administration; access controls ; risk identification, monitoring and analysis; incident response and recovery; cryptography ; network and communications security; and systems and application security. A variety of training options are available, both online and in person.

article thumbnail

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud. This is a story that a word geek like me can really appreciate. You wouldn’t think that the font you use on a document could expose it as a fake document, but in this case, it did.

article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

DEG didn’t survive the 2003 change in administration and its core functions were re-absorbed back into the Department of Administration technology divisions. And, of course, they struggle to keep up with evolving risks and technologies. Playing Catch Up.