Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

The Network and Information Security Directive: Serious Cyber Attacks Will Require Notification

The Council of the European Union adopted the EU Network and Information Security (NIS) Directive (the ‘Directive’) 17 May, ready for final adoption by the European Parliament. The Directive, initially proposed in 2013, has...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Most Frequently Hacked Industries Now Includes Manufacturing

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

5 Ways to Defend Against Ransomware

Last week, Fish hosted a cybersecurity panel session at our L.E.A.D. retreat in Dallas. We discussed the need for a full-spectrum cybersecurity risk assessment and plan, and during the course of the presentation, we touched...more

Help! They've got Grandma's Data and They're Holding it for Ransom!

Imagine if you started to open a resident’s file on your computer and this message came up on your screen against a red background...more

PCI DSS 3.2: It’s here, what does it mean for you?

The Payment Card Industry Security Standards Council (PCI SSC) has released a new version of its data security standard for the protection of cardholder data, the Payment Card Industry Data Security Standard (PCI DSS). PCI...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

Stick Up Your Hands! The Increasingly Common Form of Ransom, and the Insurance That Will Help You Recoup Some of Your Funds

It was recently revealed that the Hollywood Presbyterian Medical Center paid $17,000 in bitcoins as ransom to hackers who infiltrated and disabled its computer network. This is not the first time hackers have held up a...more

Trade Secrets and Cloud Services: Is the Sky the Limit?

Germany is not only known as one of the best countries for enjoying beer and bratwurst, but it is also known as a country with some of the strictest data privacy laws on the planet. Within this environment, should companies...more

Alert: 2016 Verizon Data Breach Investigations Report

On April 26, 2016, Verizon published its ninth annual Data Breach Investigations Report ("DBIR"), which looks at breach trends, common vulnerabilities, and categories of security incidents that affected organizations in 82...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

Your daily dose of financial news The Brief – 5.2.16

Nearly a year-and-a-half after announcing their plans to join forces, Halliburton and Baker Hughes have reportedly called off their $35 billion merger. Serious DOJ reservations about the deal and a wildly changed energy...more

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Tennessee Gives Businesses 45 Days for Data Breach Notice

Recent amendments to the State’s data breach statute give a hard deadline for a business to provide consumer notice, removes encryption safe harbor, exempts entities that are subject to the Health Insurance Portability and...more

622 Results
|
View per page
Page: of 25
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×