article thumbnail

Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons

LogisManager

Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons Last Updated: October 17, 2024 In 2024, Change Healthcare faced a significant data breach that rippled across the healthcare industry, highlighting how risks are interconnected and can spread beyond their point of origin.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Colonial Pipeline Hack: Failure in Risk Management. With strong Enterprise Risk Management (ERM), nearly 100% of all liabilities can be avoided. ERM fosters effective governance programs that identify and prevent system misconfigurations, poor patch management practices and weak password management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing Third-Party Risk in Healthcare Supply Chains

Reciprocity

Schedule a demo to see how ZenGRC can strengthen your healthcare vendor risk management program. When third-party vendors gain access to PHI, that trust extends to them as well, making robust vendor risk management not just a regulatory requirement, but an ethical imperative.

article thumbnail

Risks Associated With Business Task Automation and How to Mitigate Them

LogisManager

Risks Associated With Business Task Automation and How to Mitigate Them Last Updated: January 14, 2025 If your business is investing in task automation, you’ll benefit from increased efficiency and reduced manual tasks. While business task automation (BTA) offers companies a new way to manage workflows, it also comes with new risks.

article thumbnail

Why do we need a risk-based approach to authentication?

Behavior Group

authentication 20 years ago, everyone worked at a desktop workstation hardwired into an office building. The post Why do we need a risk-based approach to authentication? This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter.

article thumbnail

How to Safely Automate Employee Onboarding

LogisManager

For risk managers, onboarding is more than just welcoming new team members it’s about ensuring everyone understands compliance while preventing business risks. Risk managers can use automation to train new employees without increasing security risks. Encourage Collaboration Safety is a team effort.

Audit 52
article thumbnail

Protecting Your Corporate Website as an Enterprise Risk Management Strategy

Reciprocity

Protecting your corporate website as an enterprise risk management strategy can keep your data, customers, sensitive information, and reputation safe. Broken Authentication and Session Management. Why Protecting Your Corporate Website as an Enterprise Risk Management Strategy Matters?