Cyber Attacks Data Breach

News & Analysis as of

UMass Amherst Settles HIPAA Violations with OCR for $650,000

The Office for Civil Rights (OCR) has announced that the University of Massachusetts Amherst (UMass) has agreed to settle an investigation against it as a result of a malware infection for $650,000, along with implementing a...more

HHS Issues Warning About Phishing Campaign Disguised As Official Communication

As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered...more

New FTC Data Breach Response Guidelines

Cybersecurity should always be at the top of any retailer’s priority list—and even more so as the holiday shopping season gets underway. To that end, the Federal Trade Commission’s newly-released Data Breach Response...more

OCR Alerts Listservs About Fake Phishing Email to Covered Entities and Business Associates

On November 28, 2016, the Office for Civil Rights (OCR) issued an Alert to its listservs that a phishing email is being circulated on “mock HHS Departmental letterhead under the signature of OCR”s Director, Jocelyn Samuels”...more

FTC Publishes Data Breach Response Guidelines

Whether resulting from a planned cyberattack or mere carelessness, data breaches are on the rise. In 2015, 781 data breaches were reported across the United States, with the average breach costing $3.8 million. In 2016, the...more

Cybersecurity 2017 – The Year in Preview: Emerging Security Threats

Editor’s note: This is the fourth in a continuing end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, and HIPAA compliance. Our last two posts will focus on the energy...more

NIST Releases Comprehensive Cyber Security Guidelines for the Internet of Things

As the Internet of Things continues to grow and expand, the fact that guidance on security measures and protections is a necessity has become increasingly evident. Recently, the National Institute of Standards and Technology...more

FTC Announces New Guidance on Ransomware

On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact of, and how to respond to ransomware. Ransomware is a form of malicious software that infiltrates...more

DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman

This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk...more

Cyber Insurance 101: Read This Before Selecting a Cyber Insurance Policy

Several recent, large-scale cyber events, including both data breaches and cyber attacks, demonstrate that companies, both large and small, must protect themselves against the risk of a cyber event. Cyber insurance policies...more

Cybersecurity 2017 – The Year In Preview: Trade Secret Theft Takes Center Stage

Editor’s Note: This is the first of an end-of-year series of posts examining coming trends in cybersecurity. Posts will examine trends in state regulations, federal regulatory authority, the changing nature of the threat...more

Bryan Cave Data Security Breach Handbook - 2016

Since the first publication of this handbook in 2014, the legal ramifications for mishandling a data security incident have become more severe. In the United States, the number of federal and state laws that claim to...more

Critical Cyber-Attack on Hospitals Now A Reality- A View From ‘Across the Pond’

Serious trouble for all health and care providers looms large. High risk women in labour and major trauma cases are being diverted to other hospitals after a cyber-attack recently shut down services at a hospital in the...more

FTC Releases Tips & Advice on Ransomware

On November 10, 2016, the Federal Trade Commission (FTC) released tips and advice for businesses and consumers on ransomware. For businesses, the FTC released Ransomware – A closer look and a companion video, Defend against...more

Attacking Cybersecurity from the Inside Out: Part II

Last week in the first installment of our Attacking Cybersecurity from the Inside Out series, we outlined the steps a company’s board and executive leadership should take to prioritize cybersecurity. In this second...more

Preparing for a Data Security Breach: Ten Important Steps to Take

Is your company prepared to respond to a data security breach? For many companies, even reading this question causes some anxiety. However, being prepared for what seems like the inevitable—a security breach—can be the...more

IRS Data Breach Class Action Dismissed

Last week, the Internal Revenue Service successfully defeated a putative class action related to a data breach it suffered in 2015. The D.C. District Court’s decision dismissing the suit demonstrates the high bar required to...more

Privacy Tip #60 – Cybersecurity Tips for the New Administration

It is hard to stay focused after election night. Since the new administration has a dearth of plans, here are some tips for it to get a jumpstart on cybersecurity priorities....more

Proposed NY Cybersecurity Regulations to Impose Rigorous Requirements on Financial Services Companies

The New York State Department of Financial Services recently announced proposed cybersecurity requirements that would apply to financial services companies, insurance companies and banks. Aimed at protecting customer...more

Privacy Tip #59 – Check your Privacy Settings on Your LinkedIn Account

I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more

New Cybersecurity Reporting Requirements? FinCEN Advisory Identifies Cybersecurity Events for Financial Institutions to Report

Last week, FinCEN (Financial Crimes Enforcement Network) issued a formal Advisory to Financial Institutions and published FAQs outlining specific cybersecurity events that should be reported through Suspicious Activity...more

Cybersecurity Advice from President Obama

We’re writing this week to highlight some of the ways in which President Obama’s evolving views on cybersecurity can help guide corporate governance of data security risks. In an interview with Wired Magazine, the President...more

Does Your Insurance Cover Phishing Attacks and Business Email Compromise? The Uncertainty Continues…

The coverage landscape for “Business E-mail Compromise” (BEC) scams remains somewhat tenuous, as organizations and carriers continue to battle in court over the extent of coverage. Although recent positive,...more

Beazley Report Details Increase in Ransomware Attacks

A report issued last week by Beazley, one of the prominent insurance companies in the cyber field, revealed what industry experts predicted earlier in the year – ransomware is an increasingly prevalent menace. That report is...more

Ninety-Nine Problems but a Breach Ain’t One: Cybersecurity Lessons for Insurers

In the movie WallStreet , the character Gordon Gekko famously states that information is the most valuable commodity he knows. These days, the same could be said of data, which can now be bought, sold, and, increasingly,...more

574 Results
|
View per page
Page: of 23
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×