Remove Definition Remove Energy and Utilities Remove Government Remove Risk
article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise. That’s no coincidence because the tenets of records management are encompassed within IG (along with legal, privacy, risk/compliance, security, technology, etc.). 3 … 2 … 1 ….

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

The new version focuses substantially more on supply chain risks and management than the prior iteration, and also stresses the importance of focusing on: effective internal communications among technical and non-technical personnel, threat intelligence and information sharing, as well as increased collaboration with relevant outside parties.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

. “The ferocity of cyber criminals to take advantage of COVID-19 uncertainties by preying on small businesses is disturbing,” said Andrew LaMarca , who leads the global high-risk and fraud team at Dun & Bradstreet. For the past several months, Milwaukee, Wisc. ” PHANTOM OFFICES.

article thumbnail

FERC Proposes to Accept Updated CIP Standards and Calls for New Cybersecurity Controls

Hunton Privacy

On July 16, 2015, the Federal Energy Regulatory Commission (“FERC”) issued a new Notice of Proposed Rulemaking (“NOPR”) addressing the critical infrastructure protection (“CIP”) reliability standards. The CIP standards govern the cyber and physical security of the bulk electric system. They are mandatory and enforceable.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Only 2 definitely haven’t had data breached. GB Impact Energy Services Source New Engineering Canada Yes 52,707 Lancaster County Sheriff’s Office Source New Public USA Yes 52,567 Maximum Research Source New Professional services USA Yes 52 GB Terago Source New Telecoms Canada Yes 45 GB Zivilgeometer Source New Engineering Austria Yes 41.83

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Only 3 definitely haven’t had data breached. Publicly disclosed data breaches and cyber attacks: full list This week, we’ve found 83,463,951 records known to be compromised, and 210 organisations suffering a newly disclosed incident. 138 of them are known to have had data exfiltrated or exposed. Source (New) Manufacturing Canada Yes 1.2

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.