Security breaches

Results: 272



#Item
20131  Managing Your Practice Could Your Practice Pass a HIPAA Audit? How to avoid common data breaches

31 Managing Your Practice Could Your Practice Pass a HIPAA Audit? How to avoid common data breaches

Add to Reading List

Source URL: www.aaos.org

Language: English - Date: 2014-09-10 12:48:19
202ONLINE EXCLUSIVE 40  Start with Safe File Sharing Practices to Protect Your Enterprise Security is no longer an afterthought for enterprises. The spate of high-profile data breaches are a

ONLINE EXCLUSIVE 40 Start with Safe File Sharing Practices to Protect Your Enterprise Security is no longer an afterthought for enterprises. The spate of high-profile data breaches are a

Add to Reading List

Source URL: www.globalscape.com

Language: English - Date: 2014-07-21 14:49:47
203FOR IMMEDIATE RELEASE Contact: Kristen Anderson[removed]ext[removed]removed] Half of All Federal Agency Security Breaches Caused by Lack of User Compliance;

FOR IMMEDIATE RELEASE Contact: Kristen Anderson[removed]ext[removed]removed] Half of All Federal Agency Security Breaches Caused by Lack of User Compliance;

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-11-19 12:24:00
204Cybersecurity in the Golden State How California Businesses Can Protect Against and Respond to Malware, Data Breaches and Other Cyberincidents  February 2014

Cybersecurity in the Golden State How California Businesses Can Protect Against and Respond to Malware, Data Breaches and Other Cyberincidents February 2014

Add to Reading List

Source URL: www.summitstatebank.com

Language: English - Date: 2014-03-20 12:30:32
205BREACH LEVEL INDEX  ANNUAL RECAP[removed]TOP BREACHES BY TYPE

BREACH LEVEL INDEX ANNUAL RECAP[removed]TOP BREACHES BY TYPE

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2014-02-14 15:17:44
206New Automated Proximity Access at Gate 17 and Sector 30 New SLAC ID badges with embedded RFID are used to activate these gates and for off-hours access at the main entrance off Sand Hill Road as well as Alpine Road (gate

New Automated Proximity Access at Gate 17 and Sector 30 New SLAC ID badges with embedded RFID are used to activate these gates and for off-hours access at the main entrance off Sand Hill Road as well as Alpine Road (gate

Add to Reading List

Source URL: www-ssrl.slac.stanford.edu

Language: English - Date: 2013-07-25 18:50:01
207Forrester, Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Forrester, Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Add to Reading List

Source URL: www.oracle.com

Language: English
208GAO-14-487T Highlights, Information Security: Federal Agencies Need to Enhance Responses to Data Breaches

GAO-14-487T Highlights, Information Security: Federal Agencies Need to Enhance Responses to Data Breaches

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-04-02 10:15:33
209GAO-14-487T, INFORMATION SECURITY: Federal Agencies Need to Enhance Responses to Data Breaches

GAO-14-487T, INFORMATION SECURITY: Federal Agencies Need to Enhance Responses to Data Breaches

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-04-02 10:15:32
210

"An Economic Analysis of Notification Requirements for Data Security Breaches." Thomas M. Lenard and Paul H. Rubin July[removed]PENNSYLVANIA AVENUE NW SUITE 850 WASHINGTON, D.C[removed]PHONE: [removed]E-MAIL: info@t

Add to Reading List

Source URL: www.techpolicyinstitute.org

Language: English - Date: 2008-11-21 15:40:55