Top 10 Security Weakness Issues – In a review of over 100 enterprises we identified the security weakness issues that CIOs, CSOs, and IT pros need to address. There are:
Using only single level verification for access to sensitive data
Having “public” workstations or access point is connected to a secure network
Sharing login credentials
Connect to network from an unsecure access point
Corporate web site is encrypted but the login process is not
Using weak encryption for back end management
Using unencrypted or weak encryption for Web site or Web server management
Top 10 Security Weakness Issues Identified
Janco’s Security Manaual provides tools that IT Professionals can use to address these issues. In addition, there are a number of articles that have been published on Janco’s main web site. To see them go to the site and under the main menu bar there is a search option. With that you will be able to see all the web pages that have the term security weakness or any sub-set of the seach term.
Universities Work Together On Payment System – Shades of Internet Development
Universities Work Together On Payment System just like they did when the Internet was developed by them in the late 1960’s with ARPAnet.
Blockchain payment system must smoothly collect, process, and protect sensitive personal information
Several universities, including MIT and Stanford, are working together to develop a digital currency network that solves blockchain’s scalability and performance problems before public confidence in the technology erodes.
Funded by a Swiss-based non-profit organization, the cryptocurrency application, called Unit-e, and its blockchain-based payment system is expected to launch in the second half of this year; if successful, it would surpass even mainstream financial networks like Visa’s VisaNet in transactional capability.
This is very similiar to how the Internet was first developed. Universitiy staff and associates worked together to create a common netwok which was in competition with the then exisiting TimeSharing services. None of which exist today.
The question is will propritary systems like VisaNet exist after the public university system is operational. Research shows that well-run companies are most productive, suffer the least loss of sensitive data, and have less downtime of operations if they have good policies in in place.
The 2019 Version of the Security Manual Template was just released.
There now are new standards for user privacy and control according to Janco Associates – Janco has just released an update to its Security Manual Template which identifies mandated user rights and enterprise responsibilities related to privacy protection. The CEO of Janco, Mr. M. Victor Janulaitis said, “We have reviewed in detail the California Consumer Privacy Act of 2018 (CaCPA) and generated a detail list of user rights and business responsibilities that are mandated. The CaCPA requirements are very complex and significant resources will have to be allocated for organizations to comply with these new mandates. These mandates will impact all organizations that have an Internet presence in the U.S. and California in particular. The compliance deadline is January 1, 2020.”
The Security Manual Template is now distributed in a segmented format with five (5) specific directories. They are:
Security Manual Template directory – containing the full editable MS WORD and pdf versions of the template;
Forms directory – containing all the forms that are needed to implement a “World Class” security infrastructure;
Policy directory with 5 policies in MS WORD and pdf versions – Blog and Personal Website Policy – Mobile Use Policy – Sensitive and Confidential Information Policy – Server Security Policy – Travel and Off-Site Meeting policy;
eBook directory (with the author’s name as the directory name)- with eBook versions of the Security Manual Policy and the supporting policies; and
Tools directory with the Business Impact Analysis Tool, Threat and Vulnerability Assessment Tool, Security Checklist, and PCI Audit Program.