<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; PII</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/pii/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Major security breaches hit healthcare</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/#comments</comments>
		<pubDate>Tue, 01 May 2012 23:28:38 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=143</guid>
		<description><![CDATA[The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost. And it was the work of insiders. According to an article entitled “Healthcare Unable to Keep Up [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost.  </p>
<p>And it was the work of insiders.</p>
<p>According to an article entitled “Healthcare Unable to Keep Up with Insider Threats” by Ericka Chickowski on the Dark Reading website, the three incidents are typical of “the types of consequences healthcare organizations face when they fail to address insider threats through improved employee screening, monitoring, data controls, and security awareness training.”.</p>
<p>These insider threats were and are potentially malicious and at the very least inept. In the case of the UDH, records were exposed due to the misconfiguration of a server containing the files. At Emory, human error accounted for the loss of a significant number of patient records when 10 backup disks went missing. In South Carolina, a DHHS employee (who has since been fired and arrested) sent thousands of Medicaid patient records to himself in an email.</p>
<p>The healthcare industry, by and large, “has been notoriously incapable of pinpointing risks in general, let alone those from insiders,” the article offers. Sourcing the problem is difficult because these security holes include loss or theft of portable devices such as laptops, smartphones, external drives and backup tapes; actual theft by data thieves; and simple staff ignorance in terms of security, protocol and training.</p>
<p>With solutions available today, those institutions could easily tell the difference between intentional and non-intentional privacy violations, achieve full regulatory compliance, and pass any audit with real-time user activity log files. As the “insider threat” continues to grow right along with the healthcare industry, major steps will need to be taken to stanch the flow of lost and misappropriated records that can and will lead to increased fraud and identity theft. The time to act is now. </p>
<p>To learn more about Attachmate’s Luminet enterprise fraud management software please visit http://www.attachmate.com/Products/efm/luminet/luminet.htm.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anonymous shreds intelligence firm Stratfor in latest hack</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/#comments</comments>
		<pubDate>Thu, 29 Dec 2011 00:26:58 +0000</pubDate>
		<dc:creator>Larry Meeusen</dc:creator>
				<category><![CDATA[Banking Fraud]]></category>
		<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Retail Fraud]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Statfor]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=114</guid>
		<description><![CDATA[Stratfor specializes in &#8220;strategic intelligence on global business, economic, security and geopolitical affairs,&#8221; It appears Stratfor failed to encrypt any of its credit card information, despite promises &#8220;to maintain safeguards to protect the security of these servers and your personally identifiable information,&#8221; according to its privacy policy.” http://www.scmagazine.com/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/article/220781/?DCMP=EMC-SCUS_Newswire I just wonder when will corporations and [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Stratfor specializes in &#8220;strategic intelligence on global business, economic, security and geopolitical affairs,&#8221;</p>
<p>It appears Stratfor failed to encrypt any of its credit card information, despite promises &#8220;to maintain safeguards to protect the security of these servers and your personally identifiable information,&#8221; according to its <a title="privacy policy" href="http://www.databreaches.net/?p=22450">privacy policy</a>.”</p>
<p><a href="http://www.scmagazine.com/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/article/220781/?DCMP=EMC-SCUS_Newswire">http://www.scmagazine.com/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/article/220781/?DCMP=EMC-SCUS_Newswire</a></p>
<p>I just wonder when will corporations and their executives start being held criminally liable for such egregious security blunders? Until then, there is very little reason for many of them to change….just my two pennies. Sales point is that no one is safe and all should at least entertain a conversation with you about your security solutions, right?</p>
<p>Happy New Year.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/anonymous-shreds-intelligence-firm-stratfor-in-latest-hack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>