President Biden signed an executive order to bolster the federal government’s cybersecurity posture on May 12. The order focuses on implementing vital improvements to networks of federal departments and agencies, many of...more
6/9/2021
/ Biden Administration ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Executive Orders ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
Government Agencies ,
National Security ,
Notice Requirements ,
Risk Assessment ,
Risk Management
Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols.
Key...more
2/21/2020
/ Cyber Threats ,
Department of Justice (DOJ) ,
Electronically Stored Information ,
Email ,
FBI ,
Financial Fraud ,
Financial Transactions ,
Fraud ,
Risk Management ,
Security and Privacy Controls ,
Wire Fraud
Ninth hearing on Competition and Consumer Protection in the 21st century highlights challenges of addressing persistent threats to data security.
On December 11 and 12, the Federal Trade Commission (the FTC or the...more
HHS OCR issues checklist, iterative guidance in wake of WannaCry and Petya attacks; Anthem breach settlement provides additional lessons.
Key Points:
..Healthcare organizations are particularly vulnerable to ransomware...more
7/11/2017
/ Business Associates ,
Covered Entities ,
Cyber Attacks ,
Cyber Incident Reporting ,
Data Breach ,
Department of Health and Human Services (HHS) ,
Guidance Update ,
Health Care Providers ,
Incident Response Plans ,
OCR ,
Popular ,
Ransomware ,
Risk Management ,
Security and Privacy Controls
The Trump Administration has issued a much anticipated Executive Order (EO),“Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” directing federal executive agency heads to undertake various...more
Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more
Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols.
Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more
1. Start Early -
Buyers should begin conducting cybersecurity risk assessments early in the engagement process. The target should be able to identify which information technology systems and data sets are key to the...more
Alleged HIPAA Violations Resulted from Medical Center’s Failure to Risk Assess Internet-Based Document Sharing Application and Inadequate Breach Response.
The US Department of Health and Human Services (HHS) Office for...more
9/2/2015
/ Business Associates ,
Cloud Computing ,
Covered Entities ,
Data Breach ,
Data-Sharing ,
Department of Health and Human Services (HHS) ,
Electronic Medical Records ,
Enforcement Actions ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Hospitals ,
OCR ,
Patient Confidentiality Breaches ,
PHI ,
Risk Management ,
Security Breach
“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more