Cyber Attacks Data Protection

News & Analysis as of

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

Privacy & Cybersecurity Update: New York State Proposes Cybersecurity Regulation for Financial Institutions

New York state has proposed a new regulation — to go into effect January 1, 2017 — that would require banks, insurance companies and other financial services institutions regulated by the New York State Department of...more

Centers for Medicare and Medicaid Services Issues Emergency Preparedness Requirements That Address Cyber-Attacks

The Centers for Medicare and Medicaid Services (“CMS”) issued a final rule on September 8th, 2016 establishing national emergency preparedness requirements for providers and suppliers participating in Medicare and Medicaid in...more

Business Viewpoint with Tom Vincent: Early investments can pay off in protecting company information

A breach of a company’s information security, and the theft or loss of sensitive data, can be very expensive. These costs can often be reduced, however, by making investments in the security of the company’s information – and...more

FTC Round-Up: NIST Framework Compliance Is Not Enough and Looming Ransomware Enforcement Activity

On August 31st and September 7th, 2016, the Federal Trade Commission (FTC) provided guidance regarding cybersecurity standards, which companies should consider when assessing their current data security posture....more

The Big Think: Cybersecurity – The Threat From Within

Welcome to The Big Think – the thought leadership series from Allen & Overy’s global Employment practice. Its mission is to think big, think forward and think without boundaries. Members of our international team put...more

Cyber Update: What Businesses Must Know about the New Presidential Policy Directive

Last month the White House disclosed how the federal government will coordinate incident response activities in the event of a large-scale cyber incident. While the policy directive is worth reading in its entirety, this...more

Health Care Matters, Summer 2016

Special Masters in Health Care Antitrust Merger Cases: Resolving the Conflicting Interests - One of the most challenging aspects of antitrust cases in the health care field is the rich mixture of public interest...more

Hackers Dubbed ‘Ghoul’ Targeting Industrial Businesses across the Globe

Researchers at Kapersky Labs say they have uncovered an industrial hacking scheme that they have dubbed “Operation Ghoul” that has hit 130 organizations in 30 countries. ...more

Cybersecurity Risks to the Manufacturing Sector

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more

The Goal of Gender Equality in Cybersecurity

I have the privilege of teaching the Privacy Law class at Roger Williams University School of Law (RWU). It is a required course for the school’s Joint Masters in Cybersecurity/Juris Doctor program, which is, to my knowledge,...more

LastPass Security Vulnerabilities Discovered

Passwords have always been a challenge. It is hard to remember them, and you are not supposed to use the same password across different platforms. Several companies, including LastPass, have tried to help consumers with...more

New Presidential Policy Directive Hopes to Coordinate Federal Response in the Event of a Cyber Attack

In an implicit acknowledgment that the Federal government's response to cyberattacks is diffused among quite a number of agencies, the White House issued Presidential Policy Directive (PPD) 41 last week (July 26). The...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

Collaboration Key to Combatting Cyber Threats: Federal Government Issues Final Guidance Clarifying Liability Protection for...

On June 15, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) jointly issued final guidance on how the private sector and government will communicate cyber threat data and defensive measures under...more

Raytheon/Ponemon survey confirms companies wait until an event to hire a data security vendor

The results of a Raytheon commissioned Ponemon study released on June 7, 2016 shows that at least two-thirds of businesses wait until they have experienced a cyber-attack or data breach to hire and retain security vendors to...more

2016: The Year of Cyber Insurance?

It has been said that there are two types of companies in the world – those that have been hacked, and those that do not yet know they have been hacked. While perhaps an overstatement, it seems that every day, another company...more

Noodles & Company alerts customers of credit card compromise

According to Noodles & Company (“Noodles”), it received information from Visa that Visa cards used by customers at its fast-food chains since January have “possibly” been compromised. It is presently investigating unusual...more

O’Charley’s diners warned of payment card data breach

Diners who used credit and debit cards at the Tennessee based O’Charley’s restaurants between March 18, 2016, and April 8, 2016, were notified by O’Charley’s of a data breach that affected its point of sale systems. Consumers...more

Health Care Employees at the Frontline in The Battle Against Ransomware

As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

347 Results
|
View per page
Page: of 14
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×