The soon-to-be-launched HIPAA compliance audit program likely will initially offer comprehensive assessments of compliance with the HIPAA privacy and security rules, rather than focusing on specific narrower issues, says Susan McAndrew of the HHS Office for Civil Rights.
The cyber threat landscape is more widespread than ever before, and cybersecurity professionals are needed in all sectors, from government to private industry, says Dickie George of the National Security Agency.
United Nations Federal Credit Union says member satisfaction and acceptance of the chip card have been contagious, since the bank launched the chip option last summer. The chip-card portfolio has proven to be the credit union's most successful.
"The timing and the targets point to China," says cybersecurity policy expert James Lewis. "Spying right before the Beijing Olympics and focusing on Southeast Asia reflects China's larger interests more than those of any other country."
The FFIEC Authentication Guidance update is out, and third-party service providers need to begin reviewing their internal systems and communicating with their financial institution customers, says Wells Fargo Bank's Phil Alexander.
Banking institutions have a lot to do in order to prepare for the Jan. 2012 deadline to conform with the new FFIEC authentication guidance, and former banking regulator William Henley has one, simple piece of advice: start now.
Debit fraud in the U.S. continues to grow as transaction volume increases. As international markets move away from mag-stripe and toward chip & PIN technology, fraud experts say U.S. card issuers can expect to see fraud continue to escalate.
Organizations taking proper preventative measures realize a cost savings of nearly 25 percent over those that don't, an analysis of a survey sponsored by Hewlett-Packard reveals. Still, the study shows, it takes longer to resolve cyberattacks than it did a year ago.
"The lack of individual accountability over user accounts provides ample opportunities to conceal malicious activity such as theft or misuse of veteran data," VA Assistant Inspector General Belinda Finn says.