IT Compliance Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
- Category: SOX
If you haven’t yet been asked ‘The auditors want us to...’ or ‘The auditor suggested...’ or ‘...wants to know how we...’ the likelihood is, you will be soon!
- Category: SOX
Following the Tesco Bank attack that left 9,000 Tesco customers with £2.5 million in fraudulent transactions, the UK banking sector enacted contingency plans that enable members to share critical intelligence information in hopes to prevent these kinds of attacks.
- Category: HIPAA HITECH
While the digital health industry was intended to make health records more accessible for doctors and patients, it seems to be doing more harm than good.
- Category: HIPAA HITECH
According to the latest Digital Health report by Accenture, healthcare providers are at risk of losing $305 billion in collective lifetime patient revenue over the next five years.
- Category: FedRAMP
The cloud has created a level of convenience and scalability that was unprecedented until just a few years ago. However, while cloud adoption has gained popularity over the last few years, security and compliance have historically been lacking in this field.
- Category: FedRAMP
NNT Change Tracker Version 6.5 has now been certified for the CIS Benchmark for SUSE Linux Enterprise Server 11. This means any organization using SUSE LES 11 can use Change Tracker to easily assess how vulnerable to attack their systems are and, using the built-in remediation advice within the reports provided, implement a comprehensive hardened build standard.
- Category: NERC CIP
A NERC CIP compliance audit isn’t all speedboats and supermodels, even when tackling CIP 007 (which is actually focused on maintaining a hardened build standard and may leave you wanting to fire your own ejector seat).
- Category: NIST 800-53
NNT review and discuss the range of Cyber Security Threats predicted by analysts and vendors and present a Top Ten of Cyber Security Safety Measures. Drinking kale and beetroot smoothies isn’t one of them, but to find out why not, and to see what did make the list, read on…
- Category: NIST 800-53
Hackers have managed to breach the U.S. Government’s computer systems and have leaked thousands of personal details belonging to the U.S. Department of Homeland Security and the Federal Bureau of Investigation employees.
- Category: NIST 800-171
The National Institute of Standards and Technology (NIST) latest publication, NIST 800-171, focuses on protecting Controlled Unclassified Information (CUI) within nonfederal information systems and organizations.
- Category: COBIT-ITIL-ISO27001
With the growing awareness that cybersecurity is an urgent priority for any business, there is a ready market for automated, intelligent security defenses. The silver-bullet against malware and data theft is still being developed (promise!) but in the meantime, there are hordes of vendors out there that will sell you the next best thing.