journal header

Volume 4, 2018

This Week's Online-Exclusive Feature

The Price of a Data Breach

The Price of a Data Breach
15 August 2018
Van Ha Le and Bianca Zamora

In this modern age, the volume of data shared among different platforms has exponentially increased as technology becomes more prevalent across all industry sectors. Although technological advancements have improved efficiency, they have unintentionally increased the risk of confidential and other sensitive information becoming compromised. In 2017, the number of reported data breaches—incidents in which data are stolen or taken from a system without authorization and/or knowledge of their owner—reached a total of 1,579 in the United States, an almost 45 percent increase from the previous year. Notable breach cases included the US Department of Homeland Security, LinkedIn and Yahoo. However, one of the most publicized cases involved Equifax’s security breach. According to NBC News, Equifax admitted to a failure in remediation efforts after discovering a malicious infiltration caused by security weaknesses in March 2017. As a result of the infiltration, sensitive information such as names, dates of birth, Social Security numbers, and other personal identifiers of more than 143 million US consumers were compromised. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Blog

SWIFT Infrastructure Needs to Be Secured in a Structured Manner
13 August 2018
Vimal Mani, CISA, CISM, Six Sigma Black Belt

In the last few years, SWIFT has become a favorite target for hackers across the globe. The frequency of SWIFT-targeted cyberattacks is a good indicator of the same. In most of these SWIFT-targeted attacks, the network perimeter was compromised before the core SWIFT platform was touched. It is first important to ensure that we have a foolproof network perimeter built around SWIFT infrastructure with appropriate security solutions in a defense-in-depth manner.

Data confidentiality in SWIFT can be achieved through the encryption of all payment-related data and having all links controlled by SWIFT using strong encryption algorithms. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Add Value to What Is Valued

Auditing Data Privacy

Innovation in the IT Audit Process

Backup and Recovery

Auditing Mobile Devices

Doing More With Less


Full Journal Issues

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Sponsored Feature Articles

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization