News & Analysis as of

Cyber Attacks Employee Training

Ankura

Beyond Cybersecurity: Building a Cyber-Resilient Organization

Ankura on

In an era of escalating cyber threats and evolving attack vectors, organizations can no longer rely solely on cybersecurity to protect their digital assets. Instead, they must develop a comprehensive cyber resilience strategy...more

McGlinchey Stafford

Cyberattacks Against U.S. Water Supplies on the Rise: EPA Urges Utilities to Fortify Defenses

McGlinchey Stafford on

The increasing threat of cyberattacks against U.S. water supplies has raised significant concerns among federal officials, who emphatically stress the need for utilities to bolster their cybersecurity measures. A recent...more

Mandelbaum Barrett PC

Paging Cybersecurity: Healthcare Providers Need to Make a “Change” to Protect Themselves, and Their Patients, Against Cyberattacks

Mandelbaum Barrett PC on

In February 2024, the healthcare industry was rattled by a significant cyberattack targeting Change Healthcare (“Change”), a subsidiary of UnitedHealth Group, one of the largest health insurance companies in the world. The...more

Fisher Phillips

Insider Threats to Healthcare Data: What You Need to Know and 5 Steps You Can Take Now

Fisher Phillips on

Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Vinson & Elkins LLP

Who’s to Blame: Texas Federal Court Finds Contractual Counterparty Not Liable for Third-Party Wire Transfer Fraud

Vinson & Elkins LLP on

The facts are an oft-told business email compromise horror story: a hacker interjects themselves into an email discussion of a business deal, changes the wire instructions to their own account, and disappears with the...more

Ankura

Understanding Cyber Resilience: Key Principles of a Modern Security Strategy

Ankura on

In today's fast-paced digital world, organizations face an increasingly complex and evolving landscape of cyber threats. Cyberattacks are no longer a question of if but when, making it imperative for businesses to not only...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Fisher Phillips

Ransomware Costs Businesses Record-High $1 Billion in 2023: Your 5-Step Plan to Prevent Attacks in 2024

Fisher Phillips on

2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more

Fisher Phillips

Deepfake Scammers Steal $25 Million From Company: 5 Ways You Can Avoid Being Victim to Latest AI Nightmare

Fisher Phillips on

A group of scammers recently used deepfake technology – now readily available to just about anyone – to trick a finance employee into paying them over $25 million of corporate funds. This might be one of the world’s biggest...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Cybersecurity is Important for Small Business Too.

Jackson Lewis P.C. on

Small businesses may be discouraged from investing in preventive cybersecurity measures due to the expense involved and the mistaken belief that only larger companies are the target of cybercrimes. But that is not the case....more

Jackson Lewis P.C.

Importance of Protecting Employee Information as Privacy and Cybersecurity Laws Proliferate

Jackson Lewis P.C. on

Most human resources professionals are concerned about the privacy and security of the vast amounts of personal information they manage. This article discusses steps to consider taking against the challenges. Deluge of...more

Amundsen Davis LLC

Don’t Gamble With Your Cybersecurity and Incident Response Plan: Lessons Learned from the Las Vegas Ransomware Attacks

Amundsen Davis LLC on

Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more

Foley & Lardner LLP

Recommendations for Managing Cybersecurity Threats in the Manufacturing Sector

Foley & Lardner LLP on

In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more

Amundsen Davis LLC

Is Nothing Sacred? Cyberattacks May Impact Director and Officer Fiduciary Duties

Amundsen Davis LLC on

MGM Resorts is the latest victim of a cyberattack occurring on September 10th, which has set back the gambling and leisure giant substantially, both in terms of business function and income. MGM is not alone. Household names...more

Jackson Lewis P.C.

Insights From The IBM 2023 Cost of a Data Breach Report

Jackson Lewis P.C. on

The annual Cost of a Data Breach Report (Report) published by IBM is reliably full of helpful cybersecurity data. This year is no different. After reviewing the Report, we pulled out some interesting data points. Of course,...more

Levenfeld Pearlstein, LLC

Two Fundamental Shifts in the New “National Cybersecurity Strategy”

In March 2023, the Office of the National Cyber Director released the public version of the National Cybersecurity Strategy, which provides strategic guidance for how the U.S. should protect internet users from cyberattacks...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Ankura

How to Close the Cybersecurity Skills Gap: Collaboration, Creativity, and Education

Ankura on

The cybersecurity skills gap is a major challenge facing businesses and organizations today. The immense and well-publicized illicit gains generated by cyber attackers have drawn a steady stream of talent to feed the growing...more

Ankura

Emerging Middle Market Cyber-Attack Vectors: Are You at Risk?

Ankura on

The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more

63 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide