Employees Place Patient Records on A Hosted Service. IT Training May Improve IT Security Awareness 

-

by iClass - Wednesday, December 29, 2010
Information security is crucial for the survival of any business organization. Bank and health service providers have databases containing personal and confidential information related to their respective customers and patients such as credit card numbers, social security numbers, date of birth, contact details, health insurance numbers and health protection numbers among others.

Leakage of such data may not only put information and financial security of customers at risk, but also adversely affect the reputation of the concerned organizations.

Recently, doctors at Veteran affairs hospital placed confidential patient data on a separate hosted service, without intimating the department of veteran affairs.

Lack of knowledge concerning the threats prevalent in the IT environment is one of the major reasons for security lapses by employees. As IT has become all-pervasive, hospital administrators may provide IT training to the hospital staff to acquaint them on the threats emanating in the cyberspace.

The documents were reportedly placed in a yahoo web service. Such unauthorized use of private cloud services violates the IT security policy. Cloud computing can be allowed by organizations in a regulated manner. Unregulated use of cloud services can put data security risk. Such practices also enhance the possibility of insider theft.

Organizations are also dealing with unsafe practices of employees such as use of personal emails to send confidential business information. Organizations must conduct regular security assessments and audits to identify the weaknesses and violation of IT security guidelines by employees. Government departments can encourage employees to undertake security certifications such as penetration testing training to gain technical know-how on methods used for exhaustive assessment of the IT infrastructure.

IT security specialists can also benefit from distance learning programs offered by security certification providers to individuals who cannot attend live classes.
Organizations must also implement security measures such access control to privileged databases and regular monitoring of employee logs to streamline information security. The rapidly changing security environment has made it inevitable for organizations to give high emphasis to IT security.

EC-Council provides industry training and certification for information security professionals in ethical hacking among many other specializations. “Understanding how hackers exploit these vulnerabilities is a key requirement to hardening software and hardware. That is why EC-Council focuses on ethical hacking as an approach to information security evaluation” as stated by EC-Council’s Senior Director, Steven Graham. EC-Council through its Certified Ethical Hacker program has trained such information security professionals from all over the world.

ABOUT EC-COUNCIL
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cybersecurity and e-commerce skills. It is the owner and developer of 16 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT). Its certificate programs are offered in over 60 countries around the world. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. federal government via the Montgomery GI Bill, Department of Defense via DoD 8570.01-M, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted security conferences. The global organization is headquartered in Albuquerque, New Mexico.

Press Contact
Steve Graham
6330 Riverside Plaza Ln NW
Suite 210
Albuquerque, NM 87120
Steve.graham@eccouncil.org
505.341.3228


Keywords: penetration testing training, distance learning, cloud computing, information security, IT training

-

0    submitted by iClass -
Read More Press Releases

Best Range Hood Presented Award At New Delhi Meet

Infrared Heater Review Website Launched

Fontan Operation Website Comes of Age

‘The Unsafe Future of Safe Drinking Water’—High Alarming Threats Concerning The Complex Water Toxicities Of Under-ground Water Reserves—UN-Water Decade Observance 2014.

Dangote, Zenith Bank, Quits Aviation to Invest in Kenya

High Risk Alarm for Under-ground Water Toxicification in ASIA & AFRICA Regions On The UN’s World Water Day Observance.

Learn Quran, Tajweed and Arabic with NATIVE FEMALE Qualified and experienced Teacher

Removed

Restaurant Laperouse partners with Designer TIFFANY BROWN for 2015 Winter Collection

HINT Water and Pretzel Crisps® Partners with Designer TIFFANY BROWN for 2015 Winter Collection Fashion Show

Get press releases by email