News & Analysis as of

Passwords Risk Management

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #405 – Compromised Passwords Continue to Provide Easy Opportunities for Threat Actors

Verizon’s 2024 Data Breach Report, a must-read publication, was published on May 1, 2024. The report indicates that “Over the past 10 years, the use of stolen credentials has appeared in almost one-third (31%) of all...more

Nelson Mullins Riley & Scarborough LLP

Beware of Scams that Hijack Cellphone Accounts: The Importance of Authentication for Businesses and Consumers: Privacy Day...

Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more

Alston & Bird

NYDFS Releases Industry Letter on the Use of Self-Service Password Reset Feature

Alston & Bird on

On January 12, 2024, the New York State Department of Financial Services (“NYDFS”) released a new Industry Letter on the use of self-service password reset (“SSPR”) services, which enable users to reset their own password...more

Balch & Bingham LLP

Joint Cybersecurity Advisory (“CSA”) Issued Regarding IRGC-Affiliated Cyber Threats to Multiple Sectors, including U.S. Water and...

Balch & Bingham LLP on

On December 1, 2023, the Federal Bureau of Investigation (“FBI”), Cybersecurity and Infrastructure Security Agency (“CISA”), National Security Agency (“NSA”), Environmental Protection Agency (“EPA”), and the Israel National...more

Foley Hoag LLP - Security, Privacy and the...

Your Password Can’t Possibly Be This Bad, Can It?

NordPass (the purveyor of a password manager) has assembled a list of the top 20 passwords in healthcare, based on usage by the world’s largest companies.  According to NordPass’s analysis, the “top” 20 passwords are: -...more

Bradley Arant Boult Cummings LLP

Cybersecurity Awareness Month: A Basic Primer to Keep Your Data & Information Safe

As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

Robinson+Cole Data Privacy + Security Insider

23andMe Confirms Threat Actors Accessed Accounts Without Authorization

We have posted blogs before on sharing genetic information and the risk associated with the disclosure of such sensitive information. Unfortunately, our concerns have been realized....more

Baker Donelson

I Can Hear Your Passwords

Baker Donelson on

On August 3, British researchers published an Institute of Electrical and Electronics Engineers (IEEE) article explaining how the sounds of typing on a laptop keyboard can be heard and that deep learning can be used to...more

Foley Hoag LLP - Security, Privacy and the...

If Your Password Is On This List, It’s Time to Change It

It’s been several years since I have written about password hygeine. I have been hoping that a better security solution would be widely adopted and while I hear rumors in that regard, passwords still reign supreme. So when I...more

Baker Donelson

The LastPass Lesson: Why Your Company Needs to Care About Password Manager Breaches

Baker Donelson on

In August 2022, LastPass – one of the largest password managers in the world – suffered a cyber breach resulting in the theft of thousands of password vaults of both individual and corporate users. Password managers are an...more

Robinson+Cole Data Privacy + Security Insider

LastPass Updates Disclosure of Security Incident

There are pros and cons to using a password manager. The biggest pro is that it is difficult to keep all of our passwords organized and safe. The biggest con is that if the password manager is compromised, and the master...more

Woods Rogers

Why You Need MFA Setup For Your Business

Woods Rogers on

Creating passwords needs to be a challenge, not for you to remember but for others to guess. Yet, the digital world is changing. A single sign-on password is pretty easy for unsavory characters to hack. Statistics indicate in...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

What Practices Should a Small Vendor Consider When Applying for Cyber Insurance

Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an...more

Porter Hedges LLP

Cybersecurity Best Practices: Disclosure Requirements for Risk Management, Strategy, and Governance

Porter Hedges LLP on

In previous posts on the Porter Hedges Anti-Corruption & Compliance Blog, our team has discussed the U.S. Securities and Exchange Commission’s (“SEC”) proposal to amend its rules and require disclosures related to...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Planet Depos, LLC

Security Check in the Remote Work Age

Planet Depos, LLC on

As the new year begins, it’s a perfect time to review business practices and policies, and one very important consideration is security. Whether you work from home or in an office building, you have invaluable information on...more

Woods Rogers

Prioritizing Cybersecurity in a Hybrid Workplace

Woods Rogers on

In this last week of Cybersecurity Awareness month, we will focus on cybersecurity in a hybrid workspace.  In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees,...more

Robinson+Cole Data Privacy + Security Insider

Passwords Used by Iranian-Backed Hackers Against Defense Contractors

When you are educating your employees about the importance of maintaining a complex password or passphrase, share this story to show why it is so important and to emphasize not to use same or similar passphrases across...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #301 – Can Your Co-Worker Guess Your Password? Probably!

We talk about passwords a lot. As you know, I am a fan of passphrases instead of passwords as they are hard to guess and easy to remember—a perfect combination for security data....more

Robinson+Cole Data Privacy + Security Insider

Tune Up Processes Around Passwords and Access Controls

A new report from Beyond Identity focuses on old, but very important issues—ending  access rights to network systems by terminated employees and the rampant sharing of passwords....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #268 – Changing Your Router Password

Following Ubiquiti’s security incident and its subsequent recommendation to change your router password and enable multi-factor authentication, and the fact that it is widely reported that using default passwords on routers...more

Bass, Berry & Sims PLC

Privacy Perils: Trial Separation

Bass, Berry & Sims PLC on

For those with school age children, working from home now also means learning from home. In addition to your personal web surfing and emailing, separate your kids’ online school activities from a work-issued laptop and...more

Goodwin

Practical Steps to Reduce Cybersecurity Risks During COVID-19

Goodwin on

Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more

46 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide