News & Analysis as of

Email Cybersecurity

State of the Cyber Nation: UK Government Report on Cybersecurity Breaches

by Hogan Lovells on

On 19 April 2017, the UK Government’s Department for Culture, Media and Sport (DCMS) published a report on cybersecurity breaches and how they affected UK companies in the last year. Headline statistics from the report...more

(Alleged) Spammer Squares Off With (Alleged) Hacker, Highlighting Risk of Cyber Threats

What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more

Scratching the Surface: The FTC’s Phishing Tips for Victim Companies Are a Good First Step but Companies Should Not Stop There

by Carlton Fields on

In one type of phishing, fraudsters impersonate your business when contacting consumers. Phishing victims think they’re giving information to your company — by phone or Internet —but instead give personal or financial...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Yahoo Breaches Cost Shareholders $350 Million From Lowered Purchase Price, CEO Forfeits $14 Million in Compensation

Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is...more

Privacy Tip #77 – FTC Offers Tips to Businesses That Have Been Impersonated by Phishing Schemes

On March 6, 2017, the Federal Trade Commission (FTC) released tips and a video to businesses that have been impersonated by Phishing schemes. The guidance, entitled “Has a phishing scam hooked your company’s good name?”...more

Let's Go Phishing!

by Fisher Phillips on

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

Cyber Security and Social Engineering: A Big Low Tech Problem

by LeClairRyan on

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

ALERT: Beware of W-2 Scam!

by McGuireWoods LLP on

Our Data Privacy and Security team is currently assisting multiple clients in responding to nearly identical fraudulent requests for IRS Form W-2 information. Significantly, these clients are in a number of industries and are...more

Phishing in the Insurance Coverage Gap

by Reed Smith on

Many companies that have both commercial crime and cyberliability insurance policies are learning, to their surprise, that they may not be fully covered if their employees fall for social engineering scams. While the...more

Keeping Your Company’s Data Safe This Tax Season

by Latham & Watkins LLP on

Tax-related identity theft is nothing new, but tax season 2016 took tax schemes to a new level. Last year, our cyber experts advised a large cluster of clients (public and private companies) over a period of only two...more

Update: Email Privacy Act Passes House, Again

by Morgan Lewis on

By voice vote on February 6, the US House of Representatives passed the Email Privacy Act that would, among other things, require the federal government to obtain a warrant before compelling service providers to hand over...more

Dangerous W-2 Phishing Scam Evolving; Targeting Schools, Restaurants, Hospitals, Tribal Groups and Others

by Bryan Cave on

The Internal Revenue Service, state tax agencies and the tax industry issued an urgent alert today to all employers that the Form W-2 email phishing scam has evolved beyond the corporate world and is spreading to other...more

What Did They Say About Cybersecurity in 2016? 8 Proclamations from Regulators and the Courts

by Orrick - Trust Anchor on

There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more

The Robins Kaplan Insurance Insight - Vol. 1, No. 1

by Robins Kaplan LLP on

Welcome to our newest publication, The Robins Kaplan Insurance Insight. Our goal is to deliver practical content to help you navigate the current challenges and latest developments in the insurance industry. This newsletter...more

IRS Warns Tax Professionals to Be Alert About New Email Scam As 2016 Filing Season Begins

by Dickinson Wright on

The Internal Revenue Service has warned tax professionals, as the 2016 filing season begins, to be alert to a new email scam by cybercriminals posing as clients soliciting their services. The scam is a variation of a...more

Los Angeles Community College Pays Ransomware to Retrieve Data

On December 30, 2016, the Los Angeles Community College computer network was kidnapped by cyber criminals requesting a ransom for its return. The ransomware encrypted the college’s entire network system, including...more

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

by Locke Lord LLP on

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

Over 3.1 Billion Records Breached So Far in 2016

The tally of records breached in 2016 (through November) globally was over 2.1 billion, according to IT Governance. With the announcement yesterday of Yahoo’s breach of another 1 billion records, that tally is now up to 3.1...more

Yahoo Announces Another Breach of One Billion Accounts

Yahoo Inc. announced on December 14th that hackers stole the personal information of more than one billion users, which is in addition to the 500 million accounts compromised that was announced in September....more

No Phishing: OCR Warns of Phishing Attempts Disguised as Official HIPAA Audit Program Emails

by Davis Wright Tremaine LLP on

What’s worse than receiving an email indicating that you have been selected for an audit by your favorite government regulator? Clicking on a link in the email and discovering that it is a phishing attack that has just...more

Phishing as a Service

A recent report from Imperva, Inc. has identified a Phishing as a Service (PhaaS) being offered on a Russian website. The United States Computer Emergency Readiness Team defines phishing as “an attempt by an individual or...more

OCR Issues Alerts Regarding Phishing Email Disguised as Official OCR Audit Communication

by BakerHostetler on

The HHS Office for Civil Rights (OCR) published an alert on November 28 describing a phishing email being circulated on mock HHS departmental letterhead under the signature of OCR Director Jocelyn Samuels. The email prompts...more

HHS Issues Warning About Phishing Campaign Disguised As Official Communication

by Dentons on

As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered...more

64 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!