News & Analysis as of

Cyber Attacks Security and Privacy Controls

Epiq

Cyber Incidents on the Rise: Tips for Effective Data Breach Notification

Epiq on

Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more

Epiq

The Most Effective Ways to Prepare your Organization for a Cyber Incident

Epiq on

Cyber incidents have surged in recent years, with attacks more than doubling since 2020 and the number of victims totaling in the hundreds of millions in 2023 alone. These incidents can cost organizations millions or even...more

Womble Bond Dickinson

Frontier Communications Faces Multiple Class Action Lawsuits After Data Breach

Womble Bond Dickinson on

Frontier Communications (Frontier) faces three class action lawsuits in relation to a cyber data breach in which the criminal ransomware group, RansomHub, stole personally identifiable information (PII) of over 750,000...more

Fenwick & West LLP

Cyber Resilience After the Change Healthcare Breach

Fenwick & West LLP on

More than two months after the February 2024 Change Healthcare cyber-ransom attack, the healthcare industry continues to grapple with the fallout, creating significant challenges, disruptions, and outages to the healthcare...more

Holland & Knight LLP

Plaintiffs Request Court Approval of $8.7M Settlement in ERISA Class Action Cyberattack Lawsuit

Holland & Knight LLP on

Multi-employer plan participants involved in an Employee Retirement Income Security Act of 1974 (ERISA) class action lawsuit against Horizon Actuarial Services LLC (Horizon), a national retirement services firm, have entered...more

Eversheds Sutherland (US) LLP

Cybersecurity and coronavirus - Guarding against hackers in this heightened risk environment 

Many general counsels, as well as their privacy and cybersecurity teams, are understandably focused on their company’s coronavirus safety measures - and that is good news to the hackers. Hackers thrive amidst confusion and...more

Holland & Hart LLP

3 Tips to Protect Real Estate Agents & Firms from Cybercrime

Holland & Hart LLP on

Did you know Americans lost nearly $150 million dollars to real estate internet scams last year? That makes real estate cyber crime a greater risk to Americans than identity theft ($100 million in losses) or credit card fraud...more

Burns & Levinson LLP

Early Lessons from the Marriott Breach

Burns & Levinson LLP on

On November 30th, Marriott announced that a guest reservation database on the Starwood side of its business had been breached. Initial reports indicated that upwards of 500 million individuals were affected. The stolen data...more

Parker Poe Adams & Bernstein LLP

Cyberfraud Victims May Have Violated SEC Internal Control Requirements: Adding Insult to Injury

Just when you thought the hazards of cyberfraud couldn’t get worse, the SEC recently issued a Report of Investigation (more on that later) stating that nine recent corporate victims of cyberfraud may have compounded their...more

Wilson Sonsini Goodrich & Rosati

The SEC Issues Warnings to Companies to Review Controls to Prevent Wire Fraud Hacking Attempts

In an October 16, 2018 investigation report, the Securities and Exchange Commission found that nine companies that suffered Business Email Compromise, or BEC, had insufficient internal controls to prevent such attacks....more

Burns & Levinson LLP

The Likelihood of Company Executives Being Fired Post-Data Breach – It Isn’t Pretty

Burns & Levinson LLP on

In April 2018, Verizon released the 11th edition of its Data Breach Investigations Report. As usual, the Verizon DBIR contained interesting data points culled from more than 53,000 incidents and 2,216 confirmed data breaches....more

Winstead PC

HIPAA and Accounting Cybersecurity Update

Winstead PC on

It is a strange combination of events today, but two different agencies released reports on cybersecurity issues that all companies should consider when looking at their systems, controls and checks. The U.S. Department of...more

A&O Shearman

FBI Director States That Companies That Suffer Data Breaches Will Be Treated As Victims For Law Enforcement Purposes

A&O Shearman on

At a March 7, 2018 Conference on Cyber Security co-hosted by Boston College and the Federal Bureau of Investigation (“FBI”), Director of the FBI Christopher Wray spoke about the FBI’s efforts to combat cyber threats. Among...more

Latham & Watkins LLP

How Can Healthcare Organizations Prepare for the Next Cyberattack?

Latham & Watkins LLP on

HHS OCR issues checklist, iterative guidance in wake of WannaCry and Petya attacks; Anthem breach settlement provides additional lessons. Key Points: ..Healthcare organizations are particularly vulnerable to ransomware...more

Lathrop GPM

Petya Global Ransomware Attack Shows Why Businesses Should Prepare for Loss or Unwanted Encryption of Key Data

Lathrop GPM on

What is it? This new variation of Petya (“Little Peter” in Russian) is more robust ransomware than last month’s North Korean WannaCry ransomware. It has no kill switch, and it encrypts entire hard drives, not just individual...more

A&O Shearman

WannaCry Global Ransomware Attack: What You Need to Know

A&O Shearman on

The WannaCry ransomware attack was first reported on Friday, May 12. Within hours, it shut down thousands of computer systems, locking users out of their own files. The latest report estimates over 300,000 computers in 150...more

Bennett Jones LLP

Cybersecurity Lessons from the United States: A Guide for Directors and Officers

Bennett Jones LLP on

The recent global ransomware attack (WannaCry) was yet another reminder of the increased threat posed by cyber breaches. While cybersecurity attacks are inevitable, organizations (and their directors and officers) may still...more

Womble Bond Dickinson

A Case Study on How Regional Manufacturing Firms Are Increasingly the Targets of Cybercrime

Womble Bond Dickinson on

As their methods evolve, cybercriminals are increasingly targeting regional manufacturing businesses with sophisticated and potentially costly attacks. A recent ransomware attack on a mid-sized manufacturer in the Southeast...more

Jackson Lewis P.C.

Increasing Ransomware Attacks in Higher Education

Jackson Lewis P.C. on

Malicious “ransomware” attacks — where a hacker takes control of the victim’s information systems and encrypts data, preventing the owner from accessing it until the victim pays a sum of money — are on the rise against...more

Dorsey & Whitney LLP

Director Cybersecurity Risk Oversight and Actions

Dorsey & Whitney LLP on

This article begins by providing an overview of the duty of directors to oversee risk, including cybersecurity risk, in the cyberattack context and then outlines actions that board of directors are taking as reported by...more

Robinson+Cole Data Privacy + Security Insider

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Wilson Sonsini Goodrich & Rosati

The WSGR Data Advisor - September 2015

In this issue of The WSGR Data Advisor, we examine the FCC’s recent TCPA declaratory ruling and order addressing issues regarding calling and texting consumers, and discuss the new privacy, data security, and transparency...more

Troutman Pepper

Is Your Financial Institution the Next Target of a Cyber-Attack?

Troutman Pepper on

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

BakerHostetler

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

BakerHostetler on

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide