Hackers Data Protection

News & Analysis as of

New FTC Data Breach Response Guidelines

Cybersecurity should always be at the top of any retailer’s priority list—and even more so as the holiday shopping season gets underway. To that end, the Federal Trade Commission’s newly-released Data Breach Response...more

There’s No Flying Under the Radar: Why Small Businesses Should Get Smart About Information Security

The latest publication by the National Institute of Standards and Technology (NIST), entitled “Small Business Information Security: The Fundamentals,” aims to promote and assist small businesses in their efforts to manage...more

FTC Publishes Data Breach Response Guidelines

Whether resulting from a planned cyberattack or mere carelessness, data breaches are on the rise. In 2015, 781 data breaches were reported across the United States, with the average breach costing $3.8 million. In 2016, the...more

FINRA Fines Lincoln Financial Group $650,000

A Lincoln Financial Group subsidiary has agreed to accept a $650,000 fine levied against it by the Financial Industry Regulatory Authority (FINRA) and to implement more robust security controls for a 2012 hacking that...more

Privacy Tip #62 – PoisonTap Can Compromise Computer with USB Stick

Security researcher Samy Kamkar has announced that a new hacking tool—PoisonTap—can be loaded onto a USB stick and used to hijack the Internet connection of one’s computer....more

NIST Releases Guidance on Internet of Things

The National Institute of Standards and Technology (NIST) recently released guidance for the makers of devices that use or are connected to the Internet to build robust security measures into the design of products from the...more

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

Bryan Cave Data Security Breach Handbook - 2016

Since the first publication of this handbook in 2014, the legal ramifications for mishandling a data security incident have become more severe. In the United States, the number of federal and state laws that claim to...more

NIST Releases Cybersecurity Guide for Small Businesses

We often hear from small businesses that they do not believe they can be a “target” of hackers, or that they are at risk of a cyber intrusion. This thought is naïve as small businesses are at risk of cyber intrusions, and due...more

Privacy Tip #60 – Cybersecurity Tips for the New Administration

It is hard to stay focused after election night. Since the new administration has a dearth of plans, here are some tips for it to get a jumpstart on cybersecurity priorities....more

Ninety-Nine Problems but a Breach Ain’t One: Cybersecurity Lessons for Insurers

In the movie WallStreet , the character Gordon Gekko famously states that information is the most valuable commodity he knows. These days, the same could be said of data, which can now be bought, sold, and, increasingly,...more

FTC Issues Data Breach Response Guidance

The Federal Trade Commission (FTC) this week issued the publication, Data Breach Response: A Guide for Business, that outlines steps it recommends that businesses take when it believes it may have suffered a data breach....more

HHS Publishes New Guidance on HIPAA and Cloud Computing

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has issued a new guidance regarding HIPAA compliance and the use of cloud computing solutions. The guidance is intended to assist covered entities...more

Cyber Security and Loss Recovery - A New Alternative for Organizations

The largest data breaches ever have occurred since 2015, and targets have encompassed a wide spectrum of entities. Organizations affected range from U.S. DOJ and the IRS—where citizens’ personally identifying information was...more

Prepare for the Hack: Five Things to Keep in Mind when Shopping for Cybersecurity Insurance

When your company's confidential information ends up on the dark web, it is obviously too late to start thinking about adequate insurance coverage for the barrage of claims and expenses that are about to hit like a tidal...more

Safe Travel Series: Dos and Don'ts of Hotel Safety

Hotels are susceptible to a wide array of thefts, scams, hacks, and assaults. Today, the savvy traveler needs to be security conscious. That especially applies to hotels. While any given stay will, in all likelihood, turn out...more

CFPB Management Challenges Include Information Security

On September 29th, the Office of the Inspector General (OIG) that oversees the CFPB released a memorandum detailing the major management challenges facing the CFPB.  The memo identified four areas of improvement that, unless...more

Looking Ahead: Where Automotive Innovation Meets Cybersecurity in 2017

The automotive industry has long been exempt from the cyber attacks that have affected so many companies operating in the financial services, healthcare and retail spaces. However, that is changing quickly due to the copious...more

Small-Breach Focus Shows Growing Scope Of HIPAA Probes

Flexing yet more enforcement muscle under the Health Insurance Portability and Accountability Act, on Aug. 18, 2016, the U.S. Department of Health and Human Services Office for Civil Rights announced that it will more widely...more

Aravind Swaminathan Weighs in on Proposed Cybersecurity Regulations for Financial Institutions

Aravind Swaminathan, global co-chair of Orrick’s Cybersecurity & Data Privacy team, recently spoke with Global Investigations Review regarding new plans proposed by New York’s Department of Financial Services that will...more

Don’t doubt the data breach: Massive Yahoo hack reminds us it’s not if, but when

Today, September 22, 2016, internet giant Yahoo announced a data breach that exposed the information of over 500 million of its users. The breach, announced by CEO Melissa Meyer, involved the breach of Yahoo servers exposing...more

Privacy Tip #53 – Valuable Lesson: Don’t Write Down Passwords

I have been doing a lot of live employee training lately. I really enjoy it, and have been told that it is some of the most entertaining training around. The reason why I can get the audience to laugh is because I tell real...more

Privacy & Cybersecurity Update: New York State Proposes Cybersecurity Regulation for Financial Institutions

New York state has proposed a new regulation — to go into effect January 1, 2017 — that would require banks, insurance companies and other financial services institutions regulated by the New York State Department of...more

Business Viewpoint with Tom Vincent: Early investments can pay off in protecting company information

A breach of a company’s information security, and the theft or loss of sensitive data, can be very expensive. These costs can often be reduced, however, by making investments in the security of the company’s information – and...more

Hardware Password Defaults – Do You Change Them?

IT professionals have long understood the importance of changing the default password for network connected hardware devices (printers, switches, wireless access points, etc.). In the world of the Internet Of Things it seems...more

276 Results
|
View per page
Page: of 12
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×