Polsinelli Podcast - Cybersecurity Threats - What Every Business Owner Should Know
How to Protect Your Company From Hackers
On February 11, 2015, the U.S. District Court for the Southern District of Texas dismissed a class action complaint against the St. Joseph Health System arising out of a data security breach that occurred after hackers...more
In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more
Where do we stand on standing in data breach cases? It depends on which court you ask. In December 2014, two courts considered whether plaintiffs alleged sufficient injury in their complaints involving well-known data...more
By now you’ve probably heard of Snapchat. But if you are not among its growing core base of users between 13 and 23 years of age (probably a good deal younger than you, constant reader) there’s a good chance you are not a...more
On February 11, 2015, the U.S. District Court for the Southern District of Texas held that a plaintiff lacked standing to pursue claims for alleged violations of the Fair Credit Reporting Act, 15 U.S.C. § 1681 et seq....more
The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more
Last week, Anthem Inc. – the nation’s second largest health insurer – reported a data breach involving the disclosure of the personal information of over 80 million patients and employees. Plaintiffs wasted little time...more
With recent high profile cyber-attacks against Sony and other companies, data hacking has quickly risen to forefront of issues on the President’s agenda. That’s why, as widely anticipated, the President took the opportunity...more
Industry Watchdogs Warn Brokers and Advisory Firms on Cybersecurity Threats -
Both the Securities and Exchange Commission and the Financial Industry Regulatory Authority published observations of their review of...more
On February 3, 2015 the Financial Industry Regulatory Authority (FINRA) released its long-awaited Report on Cybersecurity Practices, a broad overview of the state of play in the cybersecurity arena for broker-dealers....more
“Anthem was the target of a very sophisticated external cyber attack,” announced Joseph Swedish, Anthem’s President and CEO. Anthem, Inc., formerly known as WellPoint, Inc., is one of the largest health insurance companies in...more
The question is not whether you are going to be hacked, but rather when and how often. That thinking is so pervasive in the cyber-security industry that industry participants now refer to “cyber-resilience” to better describe...more
It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more
Welcome to the first Privacy Tuesday of 2015!
We hope that you enjoyed our 12 Days of Privacy series (and if you missed it, they are all linked in the right column of the blog…).
Three things that you should...more
Cyber terrorism, North Korea, Sony, extortion, free speech, The Interview, international relations, journalistic ethics, cyber security… can it get any better than this?...more
Unless you’ve been living under a rock recently, you’ve probably heard about the hoopla caused by the new Seth Rogen and James Franco movie called the interview. The movie follows a plot to assassinate North Korean dictator...more
The fallout from a massive cyber attack on Sony in November escalated tremendously this week. After exposing embarrassing emails and confidential company information, stealing the screenplay for an upcoming James Bond movie,...more
At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more
Last week, the Federal Bureau of Investigation (FBI) warned U.S. businesses to be alert for a malicious software bug capable of erasing hard drives and crashing networks. Although not specifically mentioned, cybersecurity...more
Our series last year was a reader favorite, so we decided to put our prognosticator hats on again and present:
Rather than look back at 2014, starting tomorrow, the Privacy & Security blog will count down The 12 Days...more
Welcome to December – we hope you had a restful and enjoyable Thanksgiving holiday.
Here are a few privacy bits and bytes to start your week.
1. ICYMI – 60 Minutes Explains Credit Card Hacking...more
In August, Paytime, Inc., a payroll services company, moved to dismiss a putative class action filed in the wake of a data breach in which the personal and financial information of more than 230,000 people was compromised. ...more
Here are three privacy stories to start your week -
1. Dear “financial institution” : how is your data security?!
Senator Elizabeth Warren (D-Mass) announced (press release) that on November 18 the Senator...more
A recent study reports that the median amount of time between an intrusion into a company’s computer network and the discovery of the incident is 229 days. The difficulty and length of time in detecting cyber infiltrations...more
Welcome to Privacy Tuesday – here are five privacy & security bits and bytes to start your week:
1) California AG’s Data Breach Report: Who Is Handling Your Patients’ Confidential Health Information? -
Back to Top