Cyber Attacks Data Protection

News & Analysis as of

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Ransomware gets even more nightmarish with Jigsaw

We have been alerting all of our readers to the nightmares of ransomware, and that the healthcare industry is a prime target. Just when you thought it couldn’t get any worse, a new strain of ransomware, known as Jigsaw,...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

New report finds executives “placing their heads in the sand” on cybersecurity

A new report commissioned by Tanium and Nasdaq finds that 90% of corporate executives admit that they can’t read a cybersecurity report and up to 40% of corporate executives do not feel personally responsible for...more

Privacy Tip #29 – U.S. + Canada issue joint ransomware special alert—read and follow recommendations

We have frequently alerted individuals and companies about the increasing risk and success posed by sophisticated phishing schemes. It has become such a real and grave problem that the U.S. Computer Emergency Readiness...more

Hacker steals Norfolk Admirals customer data

A Norfolk Admirals fan notified the Admirals last week that his information was posted online. Another customer found out that her information was posted online from the service Have I been Pwned? Her son’s name and address...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

Tennessee Amends Breach Notice Statute: Sets Notice Deadline, Eliminates Encryption Safe Harbor

Tennessee recently amended its data breach notification law, and in doing so, it has joined the ranks of states like Florida, Ohio, and Wisconsin that require notification to residents of a data breach within a defined time...more

Is Cyberinsurance the Chicken or the Egg?

The insurance industry has been making the case to Congress that cyberinsurance can be a path to good security practices, encouraging different groups inside an organization to better communicate with one another. The process...more

Cyber Insurance: Make Sure You Understand Your Coverage

Today, businesses are increasingly purchasing cyber-specific insurance in an effort to mitigate the financial impact of a breach or other cybercrime. In terms of what might be covered in a cyber insurance policy, there are...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more

Hacking Gains New Heights with Threat to Big Pharma

Cyber attacks have broken free from their initial molds of carting off with consumer credit card numbers or stealing someone’s identity. The act of digitally digging into cyberspace has hit the U.S. Department of Health &...more

An Overview of Cybersecurity Issues Affecting Retirement Plans

Retirement plan sponsors face ever-evolving cyber-related threats to plan assets and participant personal information. To combat such threats, plan sponsors should proactively assess the third-party service providers’ ability...more

Private Equity Market Intelligence: Physician/Hospital Quarterly Report - Q4

Key Findings - ..ACA enrollment reached 11.3 million by the end of the third open enrollment period, surpassing HHS expectations. Three-quarters of the enrollees were from the 38 states that use the healthcare.gov...more

[Webinar] Safeguarding Trade Secrets and Confidential Information: Top Ways to Mitigate Risks - Jan. 26, 11:00am EST

Did you know that insiders are most likely to steal confidential corporate information? And according to PwC’s Global State of Information Security Survey (2015): - As many as 71% of data security compromises go...more

Cybersecurity and resiliency: The Financial Sector’s “New Frontier”

“The Internet has a dark side,” Deputy Treasury Secretary Sarah Bloom Raskin remarked while addressing senior level banking executives at this year’s Clearing House Annual Conference. Raskin focused her comments on malicious...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

U.S. Senate Moves Forward On Cybersecurity Information-Sharing Legislation

On October 27, 2015, the U.S. Senate passed the Cybersecurity Information Sharing Act of 2015 ("CISA") by a vote of 74-21. CISA had been stalled in the Senate since its submission in April 2015 by Senators Diane Feinstein...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

More Data Vulnerabilities, Cyber Breaches Detected in Healthcare Exchanges

Government audits continue to reveal that millions of people’s personally identifiable information is at risk. Continuous audit reports by the Office of the Inspector General (OIG) of The Department of Health and Human...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Illinois to Host Cyber Risk and Security Conferences; CSBS to Co-host

On October 14, the Illinois Division of Banking announced that it would host two Cyber Risk and Security Conferences on November 9 and November 16. With the growing number of threats to financial data systems, cyber and data...more

334 Results
|
View per page
Page: of 14
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×