<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; threats</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/threats/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Major security breaches hit healthcare</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/#comments</comments>
		<pubDate>Tue, 01 May 2012 23:28:38 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=143</guid>
		<description><![CDATA[The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost. And it was the work of insiders. According to an article entitled “Healthcare Unable to Keep Up [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost.  </p>
<p>And it was the work of insiders.</p>
<p>According to an article entitled “Healthcare Unable to Keep Up with Insider Threats” by Ericka Chickowski on the Dark Reading website, the three incidents are typical of “the types of consequences healthcare organizations face when they fail to address insider threats through improved employee screening, monitoring, data controls, and security awareness training.”.</p>
<p>These insider threats were and are potentially malicious and at the very least inept. In the case of the UDH, records were exposed due to the misconfiguration of a server containing the files. At Emory, human error accounted for the loss of a significant number of patient records when 10 backup disks went missing. In South Carolina, a DHHS employee (who has since been fired and arrested) sent thousands of Medicaid patient records to himself in an email.</p>
<p>The healthcare industry, by and large, “has been notoriously incapable of pinpointing risks in general, let alone those from insiders,” the article offers. Sourcing the problem is difficult because these security holes include loss or theft of portable devices such as laptops, smartphones, external drives and backup tapes; actual theft by data thieves; and simple staff ignorance in terms of security, protocol and training.</p>
<p>With solutions available today, those institutions could easily tell the difference between intentional and non-intentional privacy violations, achieve full regulatory compliance, and pass any audit with real-time user activity log files. As the “insider threat” continues to grow right along with the healthcare industry, major steps will need to be taken to stanch the flow of lost and misappropriated records that can and will lead to increased fraud and identity theft. The time to act is now. </p>
<p>To learn more about Attachmate’s Luminet enterprise fraud management software please visit http://www.attachmate.com/Products/efm/luminet/luminet.htm.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Considering Ethics in Security</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 10:52:05 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Ethics]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=67</guid>
		<description><![CDATA[Recently, on the heels of the ISSA International Conference, noted authority Michael Angelo raised the question of ethics in security. It is a topic that comes up from time to time and never ceases to fascinate me. In his recent blog posting, Michael writes “Ethics is a particularly interesting topic as the security industry is always [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Recently, on the heels of the <a title="ISSA International Conference" href="http://www.issa.org/conf/?p=105" target="_blank">ISSA International Conference</a>, noted authority Michael Angelo raised the question of ethics in security. It is a topic that comes up from time to time and never ceases to fascinate me. In his recent <a title="blog posting" href="http://community.netiq.com/blogs/security_webb/archive/2011/10/31/reflection-upon-the-issa-awards.aspx" target="_blank">blog posting</a>, Michael writes “Ethics is a particularly interesting topic as the security industry is always concerned about addressing issues in a constantly changing environment. It is easy to follow a set of ethics if the environment is consistent, however if the environment changes will those ethics still apply or do they need to evolve?”</p>
<p>Over the years, we’ve seen huge shifts in the issue of ethics and security. The spectrum of recent dialog ranges from securing end points and the interests of enterprise all the way to hacktivism. The core tenants of privacy, security and personal responsibility are all represented in the current debate. I was heartened to see the diversity of opinion expressed by our community. It shows that we are examining critical issues, considering the implications of choice and the why of new technologies rather than mindlessly favoring the technical possibilities</p>
<p>Michael concludes <a href="http://community.netiq.com/blogs/security_webb/archive/2011/10/31/reflection-upon-the-issa-awards.aspx">his article</a> by stating, “In the 70’s corporate and professional ethics demanded secrecy around all aspects of security. The corporate and professional ethics from the 70’s have gradually evolved to enable us to disclose information and work together on solutions so that we can not only survive but we can innovate and surpass our individual boundaries. In the end it is important to remember that while our environments are evolving we must re-examine our ethics and see if they also need to evolve.” I, for one, whole heartedly agree.</p>
<p>Here are some other positions on the issues of ethics in security:</p>
<p>ISACA: Auditors Ethics for Continuous Monitoring and Continuous Auditing: <a href="http://www.isaca.org/Journal/Past-Issues/2008/Volume-3/Pages/Auditor-Ethics-for-Continuous-Auditing-and-Continuous-Monitoring1.aspx">http://www.isaca.org/Journal/Past-Issues/2008/Volume-3/Pages/Auditor-Ethics-for-Continuous-Auditing-and-Continuous-Monitoring1.aspx</a></p>
<p>SANS: The Legal System and Ethics in Information Security: <a href="http://www.sans.org/reading_room/whitepapers/legal/legal-system-ethics-information-security_54">http://www.sans.org/reading_room/whitepapers/legal/legal-system-ethics-information-security_54</a></p>
<p>Dell SecureWorks: Crossing the Line: Ethics for the Security</p>
<p><a href="http://www.secureworks.com/research/articles/other%20articles/ethics/">http://www.secureworks.com/research/articles/other articles/ethics/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>