Although the U.S. Chamber of Commerce (the Chamber) “strongly urges Congress to pass durable, bipartisan national privacy legislation that protects all Americans equally,” it will “strongly oppose legislation that fails to...more
CYBERSECURITY -
Okta Notifies Customers of LAPSUS$ Attack -
Okta, which markets itself as a “leading provider of identity” in the health care, public sector, energy, financial services, technology, travel and hospitality,...more
3/25/2022
/ Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
FBI ,
NIST ,
PHI ,
Popular ,
State Data Breach Notification Statutes
CYBERSECURITY -
Chinese APT41 Attacking State Networks -
Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more
3/11/2022
/ China ,
COPPA ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Elder Abuse ,
Hackers ,
Identity Theft ,
Information Technology ,
Military Conflict ,
Online Safety for Children ,
Russia ,
Ukraine
CYBERSECURITY -
CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine -
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more
3/4/2022
/ Artificial Intelligence ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Identity Theft ,
Information Blocking Rules ,
Malware ,
Passwords ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Russia ,
T-Mobile ,
Ukraine ,
Vulnerability Assessments
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of destructive malware that is being used to target organizations in Ukraine, with the ongoing...more
3/4/2022
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Security ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Malware ,
Military Conflict ,
Russia ,
Ukraine ,
Vulnerability Assessments
CYBERSECURITY -
Coveware 2021 Q4 Ransomware Report Issued -
Coveware issued its 2021 Q4 Ransomware Report on February 1, 2022. The report stated that although average and median ransom payments increased...more
2/11/2022
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Online Safety for Children ,
Personally Identifiable Information ,
Ransomware
Threat actors don’t wait for a convenient time to attack your company. They attack when it suits them, and when they can find any small opening. Being prepared for different types of attacks helps companies prepare for the...more
CYBERSECURITY -
ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 -
ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more
1/21/2022
/ Automation Systems ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Theft ,
FBI ,
Hackers ,
Health Care Providers ,
Japan ,
Malware ,
Popular ,
QR Codes ,
Vessels ,
Vulnerability Assessments
Passwords are so difficult to remember. We all know we shouldn’t use the same or similar passwords across platforms. Stolen password credentials are dumped on the dark web and criminals use the stolen passwords to steal other...more
1/20/2022
/ Cyber Attacks ,
Cybersecurity ,
Darknet ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Malware ,
Passwords ,
Personally Identifiable Information ,
Vulnerability Assessments
The FBI’s Internet Crime Complaint Center (IC3) recently issued a warning alerting consumers that scammers are using malicious QR Codes to reroute unsuspecting customers to malicious sites to try to steal their data....more
CYBERSECURITY -
New Mexico County Recovering from Ransomware Attack -
Another day, another governmental entity hit with a ransomware attack. If you are a resident of Bernalillo County, New Mexico, and you need a marriage...more
1/14/2022
/ Army ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Federal Trade Commission (FTC) ,
Genetic Testing ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Mobile Apps ,
Personally Identifiable Information ,
Ransomware ,
Russia
CYBERSECURITY -
FTC Warns Companies of Enforcement for Failing to Patch Log4j Vulnerability -
In what I would describe as an unusual but interesting move by the Federal Trade Commission (FTC), on January 4, 2022, it...more
1/7/2022
/ Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Federal Trade Commission (FTC) ,
Hackers ,
Personally Identifiable Information ,
Search Engines ,
Vulnerability Assessments
On January 1, 2022, Broward Health, which operates dozens of health care facilities in Broward County, Florida, notified over 1.3 million individuals that a threat actor gained access to and removed data from its system on...more
1/6/2022
/ Cyber Attacks ,
Data Breach ,
Data Protection ,
Data Security ,
Electronically Stored Information ,
Hackers ,
Health Care Providers ,
Information Technology ,
Multi-Factor Authentication ,
Personal Data ,
Personally Identifiable Information
CYBERSECURITY -
New Jersey Settles with Cancer Center Over Business Email Compromise -
One of the challenging things about HIPAA (Health Insurance Portability and Accountability Act) enforcement is the fact that both the...more
12/27/2021
/ California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Facebook ,
Fraud ,
Hackers ,
Hate Speech ,
Personally Identifiable Information ,
Popular
CYBERSECURITY -
Update on Apache log4j and Kronos Security Incidents -
It was a crazy weekend for cyber-attacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and...more
12/17/2021
/ COPPA ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Information Technology ,
Ransomware ,
Vulnerability Assessments
It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more
12/17/2021
/ Cloud Computing ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Popular ,
Risk Management ,
Software ,
Vulnerability Assessments
CYBERSECURITY -
FBI Warning: M&A Activity Targeted by Ransomware Groups -
The FBI issued a Private Industry Notification on November 2, 2021, warning companies that “ransomware actors are very likely using significant...more
11/5/2021
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Driverless Cars ,
Facebook ,
Facial Recognition Technology ,
FBI ,
Hackers ,
QR Codes ,
Ransomware ,
Vulnerability Assessments
CYBERSECURITY -
Cyber Criminals Focusing on Clinics + Business Associates -
As hospital systems become more hardened to cyber-attacks, cyber criminals are focusing their efforts on smaller providers, such as outpatient...more
10/8/2021
/ Agribusiness ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Facebook ,
Farms ,
Google ,
Hackers ,
Instagram ,
Popular ,
Ransomware ,
Social Media ,
Vulnerability Assessments
Trucking company Forward Air revealed in a filing with the Securities and Exchange Commission that it suffered a ransomware attack in December 2020 (reportedly by Hades), which caused business disruption as it was forced to...more
We talk about passwords a lot. As you know, I am a fan of passphrases instead of passwords as they are hard to guess and easy to remember—a perfect combination for security data....more
Queen Creek Medical Center (QCMC), also known as Desert Wells Family Medicine, located in Arizona, has notified up to 35,000 patients of a data breach following a ransomware attack that corrupted its medical records system,...more
9/17/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Security ,
Electronic Medical Records ,
Hackers ,
Health Care Providers ,
Information Technology ,
PHI ,
Popular ,
Ransomware
CYBERSECURITY -
Emerging Ransomware Groups Getting into the Action -
According to a report issued on August 24, 2021, by Unit 42 of Palo Alto Networks Ransomware Groups to Watch: Emerging Threats, four emerging ransomware...more
8/27/2021
/ COPPA ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
FCC ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
TCPA
There has been a flurry of reporting in the past few days on the T-Mobile customer data compromise, with allegations that the compromise affected up to 100 million customers. ...more
8/19/2021
/ Cell Phones ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Personally Identifiable Information ,
Popular ,
T-Mobile ,
Telecommunications
To establish credibility for their new criminal marketplace, cyber criminals have posted details on over 1,000,000 credit cards, stolen between 2018 and 2019, including card number, CVV number, name and address on the dark...more
CYBERSECURITY -
CISA Issues Alert on Top Exploited Vulnerabilities -
On July 28, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) issued a cybersecurity alert entitled “Top Routinely Exploited...more
7/30/2021
/ Apple ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Malware ,
Popular ,
Vulnerability Assessments