IBM OpenPages GRC Services | GRC Consulting – iTechGRC

The Allure of Healthcare Data: Why is it a Hotbed for Healthcare Cybersecurity Breaches?

Digital health systems and data-driven medical devices enhance performance and care quality in the healthcare industry. However, converting large volumes of personal health data into digital formats for storage and usage introduces several privacy and data security concerns. Healthcare data such as patient information, clinical observations, payment details, prescriptions and treatment records, and personally identifiable… Continue reading The Allure of Healthcare Data: Why is it a Hotbed for Healthcare Cybersecurity Breaches?

Homomorphic Encryption: Future of Secure Data Processing & Encrypted Computing

Data privacy has evolved alongside technological sophistications and advancements in cybersecurity attacks. Personally identifiable information (PII) gathered by companies have more than one rite of passage to affirm their safety from misuse that could lead to identity theft, fraud, data loss, or nonconsensual tracking and processing. With the increased regulatory interests at the state, federal,… Continue reading Homomorphic Encryption: Future of Secure Data Processing & Encrypted Computing

Data Management and Data Governance: What’s the Difference?

  You have probably heard about data management and data governance several times in our blogs. You aren’t the only one assuming they mean the same or involve similar functions. Although they are related, there are significant differences between them. Let’s dive into understanding how these two concepts differ and operate.    What is Data… Continue reading Data Management and Data Governance: What’s the Difference?

Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

After a prelude to the concept of social engineering as an emerging form of cybersecurity attack, let’s explore the different forms your enterprise may likely encounter.    First, let’s have a quick look at some stats on social engineering assaults:   An average business encounters nearly 700 social engineering attacks annually.    50% of social engineering attacks… Continue reading Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

Rise of Social Engineering: Why Enterprises Should Worry about this in 2024? (Part1)

In the era of digitization and GenAI, social engineering is another rapidly rising cybersecurity threat that capitalizes on human vulnerabilities. CISOs and cybersecurity leaders are always on the lookout for emerging sophistication. Threat actors apply unique methods to make their attacks look more benign and convincing.  In this two-part blog, we will unwrap social engineering… Continue reading Rise of Social Engineering: Why Enterprises Should Worry about this in 2024? (Part1)

FTC Rules Protect Against GenAI-led Impersonations: Rule Finalizes to Protect Businesses, and Government from Scams

February 15, 2024, the Federal Trade Commission (FTC) finalized the rules to address AI-enabled impersonation scams to protect consumers, government, and business entities.    Generative AI (GenAI) adoption spiked in 2022 with the release of OpenAI’s large language model (LLM)-based tool. The tool’s popularity and widespread adoption across businesses replaced many white-collar positions with AI,… Continue reading FTC Rules Protect Against GenAI-led Impersonations: Rule Finalizes to Protect Businesses, and Government from Scams