Call Us: 888 641 0500
15
NOV
2013

ISO 27002:2013 Change Summary Heatmap

The British Standards Institute (BSI)  recently released an updated version of ISO/IEC 27002 – Code of Practice for Information Security Controls.  This was the first major update since the 2005 release.  Many organizations are interested in how the changes will impact...
12
SEP
2013

New PolicyShield Update Addresses Operations and Change Management

New PolicyShield Update Addresses Operations and Change Management New information security policy updates address key elements of operational security HOUSTON, Texas – Janurary 31, 2012 – Information Shield (www.informationshied.com) today announced the latest update of...
13
AUG
2013

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!
08
MAY
2013

Information Security Policies According to NIST

Five Best Practices from NIST 800-53 In April 2013, NIST made the final updates to their complete catalog of information security requirements, Special Publication 800-53 Revision 4 – Security and Privacy Controls for Federal Information Systems and Organizations.  The...
27
APR
2013

New PolicyShield Update Addresses Operations Management

New information security policy updates address information exchange and online transaction security. HOUSTON, Texas – April 15, 2013 – Information Shield today announced the latest update of the PolicyShield Information Security Policy Subscription service. The latest...
29
JAN
2013

Security Policies Key to HIPAA BA Compliance

In January the Department of Health and Human Services (HHS) released the much-awaited final updates to the HIPAA Security, Privacy and Enforcement Rules. These updates, known as the “Omnibus Rule” were required by the HITECH Act and have been in proposal form since...
28
JAN
2013

New Guidance Requires Social Media Security Policies

In January 2013, the Federal Financial Institutions Examination Council (FFIEC) posted a set of proposed guidelines for financial institutions to maintain compliance in the world of social media.   The document entitled “Social Media: Consumer Compliance Risk Manageme...
03
DEC
2012

The Six Pillars of Personnel Security Policy

The insider threat is often discussed among the top information security risks facing organizations.  In fact, for the first time in seven years of doing the study, the 2012 Ponemon Data Loss survey listed internal mistakes by insiders is the number one cause of data breaches. ...
01
DEC
2012

Most SMBs have no Information Security Policies

87% of Business in 2012 survey have no Acceptable Use Policies Phishing attacks are now among the top security risks for organizations. Yet, according to a recent survey of small and medium-sized businesses (SMB), a full Eighty-seven (87%) percent do not have a formal written...
11
SEP
2012

Information Classification – The Link between Security and Privacy

Most of the attention focused on information security today surrounds the public data breach. Almost daily we hear a new report about hundreds or thousands of records of personal information being improperly disclosed.  In fact, it is the loss of private data that drives most of...