News & Analysis as of

Cyber Attacks

HHS Publishes Health Care Cyber Attack Checklist

by Tucker Arensberg, P.C. on

HHS has published a very brief guide, in the form of a checklist, to explain the steps for a HIPAA covered entity or business associate to take in response to a cyber related security incident. You can access the checklist at...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Troubled Japanese auto parts maker Takata, “crippled by vast airbag recalls,” has filed for bankruptcy protection in the US and is planning to sell its surviving operations to Key Safety Systems, an American rival owned by a...more

Power Outage Shows Unique Risks for Airport Cybersecurity

by Baker Donelson on

On May 27, 2017, thousands of British Airways passengers across the globe were stranded when a simple power failure took down critical systems, including those used to check in passengers. As images of crowded terminals and...more

2017 Security Breaches: Frequency and Severity on the Rise

by Revision Legal on

We are only six months into 2017, and we can already tell that it is going to be a bumper year with regard to instances of data security breaches. Looking back at the hacking statistics from 2015 and 2016, we should not be...more

Malware Capable of Shutting Down Electric Grids Confirmed

by Hogan Lovells on

Malware was recently identified that appears to have been designed and deployed by a nation-state to target and shut down electric grids. According to published reports, this malware currently appears to be capable of...more

Rallying Cry: Health Care Cybersecurity a Key Public Health Concern

by Sedgwick LLP on

On June 2, 2017, the Health Care Industry Cybersecurity Task Force published its Report on Improving Cybersecurity in the Health Care Industry. The lengthy and comprehensive Report serves as a wake-up call to the medical...more

My Entity Just Experienced a Cyber-Attack! What Do We Do Now?

by Balch & Bingham LLP on

On June 9, 2017, the U.S. Department of Health and Human Services (HHS), Office of Civil Rights (OCR) released a cyber-attack “Quick Response” checklist (the Checklist) for the benefit of HIPAA covered entities and business...more

Companies Using IoT Being Hit with Security Breaches

A new survey released by Altman Vilandrie & Company, which surveyed 400 IT personnel who have purchased Internet of Things (IoT) security products, shows that 46 percent of companies that buy IoT security admitted they have...more

OCR Releases Checklist On What To Do Following A Cyber Attack

by Murtha Cullina on

Since the WannaCry ransomware virus spread rapidly across the globe, businesses, both large and small, are again focusing on cyber-security. In a previous bulletin, we detailed five things that a business can do to help...more

OCR Issues Checklist for Responding to Cyber-Attack

The Office for Civil Rights (OCR) recently released guidance entitled “My Entity Just Experienced a Cyber-attack! What Do We Do Now?” The Checklist is a practical tool for health care entities and outlines several steps to...more

Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends

by CloudNine on

I’ve referred to last year’s Verizon Data Breach Investigations Report (DBIR) in several webcasts lately (including this one) and realized that this year’s report should have already come out by now. Sure enough it has,...more

OCR Publishes Checklist and Infographic for Cyber Attack Response

OCR released a simple checklist and infographic last week to assist Covered Entities and Business Associates with responding to potential cyber attacks. As cybersecurity remains a pressing concern for health care entities,...more

OneLogin Suffers and Notifies Customers of very Sophisticated and Scary Intrusion

San Francisco based OneLogin, which provides single sign on and identity management services for companies and app vendors, recently notified its users that it has discovered an unauthorized access to its data....more

“Fireball” Malware a Threat to Health Care Industry

A new report released by Check Point has security personnel working in the health care industry particularly concerned and they are warning their colleagues about the existence of “Fireball.”...more

ALERT – OCR Issues Quick Response Cyber Attack Checklist and Graphic

by Sedgwick LLP on

In the aftermath of the recent WannaCry ransomware attack and the May 12, 2017 notification from Laura Wolf, Critical Infrastructure Protection Lead of Health and Human Services (HHS) discussed in Cinthia Motley’s May 13,...more

WannaCry, Adylkuzz, and Cyber Breach: How to Maximize Insurance Coverage in the Event of Cyber Attack

by King & Spalding on

The worldwide hack that surfaced on May 12—known as “WannaCry”—wreaked havoc on hundreds of thousands of computers across the globe and is one of the biggest ransomware hacks the world has ever experienced. The U.K.’s...more

Compliance into the Weeds-Episode 41, Reality Winner and Internal Controls

by Thomas Fox on

In this episode, Matt Kelly and I take a deep dive into the weeds around the story of Reality Winner, the leaking of the NSA report of Russian hacking of the US Presidential campaign and election. We tie it to internal...more

The Internet of Things: A Trifecta of Cyber and Physical Threat Risks

by Wilson Elser on

The recent WannaCry ransomware cyberattack provided another chilling reminder of the potential disruptive power behind the Internet of Things. Even before the WannaCry attack in May 2017, a distributed-denial-of-service...more

Business Litigation Alert: "Expect More. Pay More. No Sale for Target After Paying Out Over $60M in Data Breach Settlements"

by Porter Hedges LLP on

Last week, Target announced that it reached a settlement of $18.5 million with attorney generals in 47 states and the District of Columbia over the massive security breach it suffered in 2013....more

Privacy Perils: To Insure or Not to Insure – Options for Cyberliability Insurance

by Bass, Berry & Sims PLC on

The commercial cyberliability insurance market is well-established, with U.S. corporations now spending in excess of $1 billion annually on insurance premiums for coverage....more

Court Applies Work Product Protection to Breach Investigation Reports

One of the most significant questions in data security law is whether reports created by forensic firms investigating data breaches at the direction of counsel are protected from discovery in civil class action lawsuits. ...more

Record-Setting Target Settlement Changes Expectations for Institutional Data Security

On May 24, 47 state attorneys general settled with Target for $18.5 million regarding its 2013 data breach. The implications of the agreement may be more far-reaching than many companies realize. The fact that nearly all...more

Recent Healthcare Data Breaches

by Revision Legal on

Healthcare computer systems harbor the most useful three pieces of personal identifying information that can be used for fraud and identity theft – names, Social Security numbers, and dates of birth. With these three pieces...more

Post-WannaCry—US-CERT Warns of Samba Security Flaw

Following the massive WannaCry event, the mantra among security folks is push patches to vulnerabilities as soon as they are released. US-CERT issued a warning late last week that there is a newly discovered flaw,...more

$10 domain name halts spread of WannaCry ransomware

by Hogan Lovells on

A major global ransomware attack going by the name of WannaCry was recently short circuited by the registration of a single domain name costing just over $10. The unregistered domain name consisting of random characters was...more

1,348 Results
|
View per page
Page: of 54
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.