Security breaches

Results: 272



#Item
201Computer network security / Secure communication / Computer security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Data breach / Practice management software / Protected health information / Security / Health / Health informatics

31 Managing Your Practice Could Your Practice Pass a HIPAA Audit? How to avoid common data breaches

Add to Reading List

Source URL: www.aaos.org

Language: English - Date: 2014-09-10 12:48:19
202Data synchronization / Cloud applications / File hosting / Dropbox / GlobalSCAPE / Gmail / Email / Accellion /  Inc. / Information security / Computing / Software / Cloud computing

ONLINE EXCLUSIVE 40 Start with Safe File Sharing Practices to Protect Your Enterprise Security is no longer an afterthought for enterprises. The spate of high-profile data breaches are a

Add to Reading List

Source URL: www.globalscape.com

Language: English - Date: 2014-07-21 14:49:47
203Computer security / Technology / Security / Electronic warfare / Military technology / Twitter / Internet security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer network security / Hacking / Cyberwarfare

FOR IMMEDIATE RELEASE Contact: Kristen Anderson[removed]ext[removed]removed] Half of All Federal Agency Security Breaches Caused by Lack of User Compliance;

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2013-11-19 12:24:00
204Crime prevention / National security / Government / Computer network security / Computer security / Electronic commerce / Internet privacy / Privacy / Malware / Ethics / Computer crimes / Security

Cybersecurity in the Golden State How California Businesses Can Protect Against and Respond to Malware, Data Breaches and Other Cyberincidents February 2014

Add to Reading List

Source URL: www.summitstatebank.com

Language: English - Date: 2014-03-20 12:30:32
205Computer security / Cyberwarfare / Data security / Data breach / National security / Identity theft / Safenet / Information privacy / Credit card / Security / Computer network security / Secure communication

BREACH LEVEL INDEX ANNUAL RECAP[removed]TOP BREACHES BY TYPE

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2014-02-14 15:17:44
206Security breaches / Access control / Stanford University / United States Department of Energy National Laboratories / Piggybacking / SLAC National Accelerator Laboratory / Radio-frequency identification / Physics / Security / Technology

New Automated Proximity Access at Gate 17 and Sector 30 New SLAC ID badges with embedded RFID are used to activate these gates and for off-hours access at the main entrance off Sand Hill Road as well as Alpine Road (gate

Add to Reading List

Source URL: www-ssrl.slac.stanford.edu

Language: English - Date: 2013-07-25 18:50:01
207National security / Computing / Computer security / Public safety / Computer network security / Database security / Information security / Database / Oracle Corporation / Security / Database management systems / Crime prevention

Forrester, Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Add to Reading List

Source URL: www.oracle.com

Language: English
208Data security / Computer network security / Secure communication / Personally identifiable information / Data breach / Government Accountability Office / Information security / Security / Computer security / National security

GAO-14-487T Highlights, Information Security: Federal Agencies Need to Enhance Responses to Data Breaches

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-04-02 10:15:33
209Data security / Computer network security / Secure communication / National security / Federal Information Security Management Act / Personally identifiable information / Chief financial officer / Data breach / United States Department of Homeland Security / Security / Computer security / Public safety

GAO-14-487T, INFORMATION SECURITY: Federal Agencies Need to Enhance Responses to Data Breaches

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-04-02 10:15:32
210Crimes / Identity / Identity theft / Theft / Credit card fraud / Credit card / ChoicePoint / Federal Trade Commission / Online shopping / Financial economics / Security / Credit

"An Economic Analysis of Notification Requirements for Data Security Breaches." Thomas M. Lenard and Paul H. Rubin July[removed]PENNSYLVANIA AVENUE NW SUITE 850 WASHINGTON, D.C[removed]PHONE: [removed]E-MAIL: info@t

Add to Reading List

Source URL: www.techpolicyinstitute.org

Language: English - Date: 2008-11-21 15:40:55
UPDATE