Skip to content
Awareity
Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • First Preventers Framework
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Resellers
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

FACTA Red Flags

Ohio Storage Bins Stolen – One Man’s Trash Is Another Man’s….

2009-11-09
By: Awareity
On: November 9, 2009
In: *Connecting the Dots Blog*, Incident Reporting, Information Privacy, Information Security, Regulatory Compliance

We have all heard the wise old saying….’One man’s trash is another man’s treasure’ and potentially we have yet another lesson learned for organizations who are obligated to protect their client’s personal information. In this lesson learned from Ohio, three large storage bins were stolen from outside of three different bank branches in three different cities.  Each of the three large storage bins contained paper that was waiting to be shredded and at least one of the storage bins contained personal documents of bank customers. A few questions this incident brings to mind: Should personal data be stored outside of buildings? Should trash/storage bins beRead More →

Customers vs. Banks – Failure to Implement Adequate Security Procedures?

2009-10-01
By: Awareity
On: October 1, 2009
In: *Connecting the Dots Blog*, Information Security, Legal, Regulatory Compliance, Risk Management

Two recent headlines caught my attention: Construction Company Sues Bank for Money Lost in Cyber Scam Couple’s Lawsuit Against Bank Over Breach to Move Forward In both of these cases, banks are being sued for not taking adequate precautions that could have prevented cyber thieves from stealing money from the customers’ accounts.  The customers claim that the banks did not offer two-factor authentication and also failed to notice suspicious and anomalous behavior.  Therefore, the customers are claiming that the banks breached their duty to protect account holder information. These lawsuits could have significant ramifications and I will be curious to see the final outcome.  ShouldRead More →

READ MORE:

WATCH MORE:


Get Solutions For Your Challenges!
 
 
 
 
 
 
Don't worry, we will only call if you request "Phone" as your contact preference. We hate spam calls too!


Not seeing the form to request information? Drop us a line and we'll send you more information!

Recent Blog Posts

When You Don’t Know What Others Know…Bad Things Can Happen (and are happening)

June 10, 2022

Reactive and Proactive Prevention Do You Know The Difference?

June 7, 2022

Remembering Virginia Tech…and Learning Too

April 19, 2022

The Solution to Harden Cyber Defenses is Patching Your People

April 8, 2022

Next Exit – How I can help YOU

March 3, 2022

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

| |

Designed using Dispatch Premium. Powered by WordPress.