How do you stop a criminal mind from getting into your key line-of-business systems? You probably can’t, which is why Mike Jones (not his real name) keeps a computer forensics services company at his beck and call. The attempts to steal the personal identifying information on credit cards never ceases.
As IT budgets continue to be squeezed and organizations struggle to find new ways to grow and innovate, outsourcing moves higher on the CIO’s “to do” list. The privacy and security implications of outsourcing relationships are a growing concern for many organizations. Most of this discussion on this topic has focused on the transfer and handling of personal data, but one area that has not been well documented is web application development.
Cooperation and communication among private and public entities would need to improve to defend against a mass cyberattack on the nation’s critical infrastructure, according to the U.S. Department of Homeland Security (DHS)findings from a February simulated cyberattack exercise.