Posts

Showing posts from May, 2024

Protecting Patient Data: The Battle Against Cybercrime in Our Hospitals

Image
A hospital network is made of many parts: computers, servers, printers, routers, switches, and  storage systems. Dangerous computer hackers with bad intentions set out to find a device they can hijack to gain access to rule them all. Organizations do not want everyone to have the ability to access their devices, but hackers often find a way to take over the device and steal user passwords and private data. Privacy is important in a hospital network, because patients give hospitals their contact information, insurance details, credit cards, and private health information. If a hacker were to steal patient records, they could find out sensitive details about the patient that may be private. The patient may not want the public to know their diagnosis, or the hacker may use their credit card information to access their bank account. When people check into a hospital, they trust that their information is private and protected. People want to feel safe, and they want the private details ...

Enhancing Network Security: Key Area of Assessment and Corresponding Audit Strategies

This week, our lesson focused on several critical areas of network security, each playing a crucial role in safeguarding information systems. In today’s digitally connected threat landscape, network security becomes foundational in monitoring and controlling traffic both in and out of any system. The CISA Certified Information Systems Auditor Study Guide discusses the importance of implementing proper internal controls with comprehensive CISA auditing that identifies potential vulnerabilities or failure points to mitigate risk: “It is the job of the CISA to evaluate the auditee's technology implementation. Despite advancements in technology, common problems will usually be rooted in fundamental errors of design or implementation. Security is best implemented in multiple layers to provide compensating control for design vulnerabilities” (Cannon et al., 2016, p. 298). Network Firewalls, Intrusion Detection and Prevention Systems, and Wireless Access Security represent three influenti...

Identity Theft: Differences in Consequence and Regulation Across State, Federal, and International Law

 According to Federal Records Management & Shredding, the Gramm-Leach-Bliley Act requires financial institutions to tell customers how they’ll use their data, whereas, the Fair and Accurate Credit Transitions Act (2024) requires the three nationwide credit rating agencies (Equifax, Experian, and TransUnion) to provide consumers with a free credit report once annually upon request to decrease identity theft in the United States.  The Gramm-Leach-Bliley Act was revolutionary because it required an opt-out notice to be added to privacy notices regarding nonaffiliated third parties in hopes of ensuring consumer financial privacy. In many instances, the Fair and Accurate Credit Transactions Act focuses on the accuracy and privacy of credit information. According to Federal Trade Commission, there are times when they overlap and privacy rules in the Fair and Accurate Credit Transactions Act require a more stringent approach to the Gramm-Leach-Bliley Act, providing an opt-out not...

Audit Process Planning: Ensuring a Compliant, Risk-based Approach to the Audit Process

When an auditor invests sufficient time in planning an audit, it sets the stage for a successful partnership that respects and supports the auditee’s journey toward continuous improvement. A well-planned audit provides the assurance to the auditee that the auditing team is not a mere evaluation or interrogation they must survive, but a supportive service meant to assist and enhance operations. This productive approach to thoughtful scheduling and reliable information gathering transforms what could be a stressful encounter into a supportive, constructive experience that leaves employees feeling valued and supported, not degraded. Instead of reacting to issues as they arise, a proactive audit respects the organization’s hard work and recognizes its achievements. By fostering a positive, ongoing relationship that serves as a supportive guide toward compliance and quality, a quality auditing team adds value to an organization and improves business processes, setting the tone for a positiv...

Risk Analysis: Different Methods Produce Varying Insights to Address Potential Risk

Image
The bow tie analysis method visually depicts the pathway from a risk event to its potential consequences (Hatch, 2018). This approach allows for quick communication of the relationship between risks, controls, and outcomes. By identifying the threat, preventative control, hazard, mitigative controls, and the consequence, the diagram quickly conveys all of the necessary information to understand the big picture. Optional color coding can convey more granular information to managers or stakeholders. Managing Cyber Security Risks using the bowties provides an excellent example of a bow tie diagram for sensitive information data in use and for unauthorized access to online confidential data (Moar, 2017). This approach shows the problems that can occur, their consequences, and how to mitigate the risk on a visual diagram. The bow tie diagram provides value by conveying meaning regarding a particular hazard. This problem-solving approach would also be useful in responding to a business conc...

Internal Audit: Exploring Governance and Risk Management

  Compare and contrast three ways where governance and management are occurring in the organization via the audit process, as identified by an auditor?   ClifftonLarsonAllen consulting firm asserts that “the concept of risk management is evolving into a more fully developed, integrated concept of risk governance in which the board of directors, senior management, and the business units of an organization all have distinctly defined roles in the overall approach to enterprise risk management” (2013, para 1). In response, organizations must adapt their internal audits to support their governance and management processes to mitigate risks. ClifftonLarsonAllen presents three case studies where governance and management are occurring in the organization via the audit process in areas of crisis management, outsourcing, and co-sourcing solutions. Due to the development of automated auditing tools, organizations often outsource and contract their IT internal control auditing process w...

Ethics In Cybersecurity: How Best Practices Shape the Public Good

Cybersecurity is an ethically significant public good because ethical practices in cybersecurity help ensure that users can trust their personal, financial, medical, and identity information is safe from exploitation. Where business processes strive to create a competitive edge, innovation, and financial gain, cybersecurity strives to protect the public from unethical behavior. The ISACA Code of Professional Ethics (2023) strives to ensure proper IT governance through compliance with standards, procedures, and controls for implementation systems. CISA provides an assurance to businesses that an IT auditor will follow professional standards and best practices with due diligence, objectivity, and competency. IT auditors must be trusted to maintain a high standard of conduct and character in both their personal and professional activities. Unless IT auditors are required legally to disclose information, IT auditors promise to educate and inform stakeholders of their findings while maintai...

First Tech Federal Credit Union: A Trusted Frontrunner in Risk Management

Greg Mitchell, the President and CEO of First Tech Federal Credit Union, recently addressed the Silicon Valley Bank in a message describing First Tech Federal Credit Union’s standing as “the nation’s eighth largest credit union with assets of $16.7 billion” (Mitchell, 2023). His message highlights several key First Tech Federal Credit Union business objectives and priorities. As an industry leader, First Tech values financial stability and secure risk management practices. First Tech is well-capitalized to handle potential financial shocks and regularly insures member funds to build confidence and trust. They strive to keep a competitive advantage regarding share rates and return on investment for members. Their member-owned model invites members to participate in the direction and governance of the credit union.  First Tech Credit Union offers a member-owned structure with insulation from liquidity challenges and competitive share rates. Their diversified funding base effectively ...

From Big Data to Ethical Standards: Redefining Security Auditing for a Digital Age

In the next three to five years the security auditing landscape will see a shift in perspective to adapt to stakeholder expectations and business needs. Security audits will likely strive to adopt a continuous, agile approach to auditing. Big Data and Machine Learning introduce new technologies and automation techniques to speed up data collection and review. Regulatory changes in major markets regarding data privacy and technological advancements will require a continuous approach to auditing to reduce risk and liability for stakeholders. In the wave of Covid-19 Ethical Standards and Privacy Policies will likely significantly alter the security auditing landscape as Americans demand a fundamental right to privacy and business owners seek data integrity. In addition to financial audits, stakeholders will need comprehensive reviews that include cybersecurity assessments and data governance (CAQ, 2020). To appease stakeholder needs, auditing will need to be more adaptive, proactive, and ...

Federalism and Privacy: Charting the Path for U.S. Data Protection Laws

The EU GDPR strives to centralize regulatory authority for data privacy and protection for all European citizens. In the United States, adopting GDPR at the federal level would significantly restrict states' ability to enact their own regulations and shape their own data protection policies tailored to the areas of concern that align with the dominant industries in their own state. Some states have adopted policies that more closely align to GDPR to ensure their personal data is handled responsibly. For example, similar to the GDPR, the California Consumer Privacy Act includes additional provisions that allow residents to opt out of the sale of their information to third parties(Cookieyes, 2024). When other countries and states interact with California residents, they must adhere to CPPA guidelines, providing Californians with additional privacy protections not offered by other states. This approach protects local innovation while also protecting consumers' privacy rights. As s...