Reporter Kashmir Hill from The New York Times (NYT) published an informative piece this week about our secret consumer scores. We all know that retail companies monitor our clicks on their websites, sell our data not...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Cyber-Stalking ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Eavesdropping ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Mobile Apps ,
OCR ,
PHI ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Data Privacy ,
Eavesdropping ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
The Office for Civil Rights (OCR) announced on October 23, 2019, that Jackson Health System (“Jackson”), a not for profit hospital system comprised of six hospitals, urgent care centers, nursing facilities and primary care...more
10/24/2019
/ Data Breach ,
Electronic Medical Records ,
Enforcement Actions ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
HIPAA Breach ,
Information Technology ,
Notice of Determination (NODs) ,
OCR ,
Personally Identifiable Information ,
PHI ,
Risk Assessment
A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks.
...more
10/18/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
National Security Agency (NSA) ,
Network Security ,
Personal Data ,
Personally Identifiable Information ,
Virtual Private Networks ,
Vulnerability Assessments
The National Security Agency issued an advisory last week to warn companies and users that nation-state actors are actively exploiting vulnerabilities in several virtual private network (VPN) service applications to obtain...more
10/18/2019
/ Advisory Opinions ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Information Security ,
Information Technology ,
National Security Agency (NSA) ,
Virtual Private Networks ,
Vulnerability Assessments
Everyone should be aware that October is National Cybersecurity Awareness Month. TechNewsWorld is urging all users to “Own IT,” which “means staying safe on social media, updating privacy settings, and keeping tabs on apps....more
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Business Interruption ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Incident Response Plans ,
Information Technology ,
Internet ,
Mobile Apps ,
Online Platforms ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Consistent with our experience, security firm McAfee has confirmed in a report that ransomware attacks have doubled in 2019. Medical providers have been hit hard this year, and one provider, Wood Ranch Medical, located in...more
10/7/2019
/ Biometric Information ,
Biometric Information Privacy Act ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Drones ,
Energy Sector ,
Facial Recognition Technology ,
Fraud Alerts ,
GAO ,
Genetic Testing ,
Google ,
Hackers ,
Health Care Providers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Power Grid ,
Ransomware ,
Scams ,
Spam ,
Unmanned Aircraft Systems
Consistent with our experience, security firm McAfee has confirmed in a report that ransomware attacks have doubled in 2019. Medical providers have been hit hard this year, and one provider, Wood Ranch Medical, located in...more
10/4/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Electronic Medical Records ,
Hackers ,
Health Care Providers ,
Healthcare ,
HIPAA Breach ,
Information Technology ,
Personally Identifiable Information ,
PHI ,
Ransomware
The Wolcott school system in Wolcott, Connecticut has been recovering for four months from a ransomware attack that hit its system at the end of the school year when it was hit with a second attack last week. ...more
Although the number of security vulnerabilities reported in the first half of 2019 have reported dropped a bit from last year, a new report by Risk Based Security states that 34 percent of the 11,092 vulnerabilities...more
It’s a busy time for colleges and universities as the fall semester starts and campuses are bustling with activity. It’s also the perfect time for cyber criminals to create mayhem for institutions of higher education with a...more
8/30/2019
/ Colleges ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Educational Institutions ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Ransomware ,
Universities
Louisiana Governor John Bel Edwards, for the first time in history, declared a statewide cybersecurity emergency last week, following cyber-attacks against several school systems in the state.
...more
8/2/2019
/ Capital One ,
Credit Cards ,
Data Breach ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Information Technology ,
Network Security ,
New Legislation ,
OSHA ,
Personally Identifiable Information ,
Safety Standards ,
State and Local Government ,
State Data Breach Notification Statutes ,
State of Emergency ,
Unmanned Aircraft Systems
After the Capital One data breach, which was reportedly caused by an improperly configured firewall, every company should be paying attention to its firewalls....more
Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more
We previously reported that the criminals behind the GandCrab Ransomware were retiring, and that a patch was discovered and companies are urged to implement the patch....more
Hackers are targeting U.S. government networks, according to U.S. Cyber Command, which says there is a vulnerability of CVE-2017-1174, which is a two year old flaw in Microsoft Outlook that is being used by attackers to...more
7/12/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
Malware ,
Microsoft ,
Network Security ,
Personally Identifiable Information ,
Risk Management ,
Security Standards ,
US-CERT ,
Vulnerability Assessments
The Internet Society’s Online Trust Alliance just released its 2018 Cyber Incident & Breach Trends Report, which says “2018–Some Better, Some Worse, All Bad.”
That’s our experience, too. Below are our highlights from the...more
7/11/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Distributed Denial of Service ,
Employee Training ,
Hackers ,
Information Technology ,
Malware ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Supply Chain
DHS Warns Businesses of Risk of Iranian-Backed Wiper Malware Attacks -
The tension with Iran has generally increased, and it has been reported that the U.S. has launched a cyber-attack against Iran. In retaliation, the risk...more
7/5/2019
/ Biometric Information ,
Canada ,
Closing a Business ,
Colleges ,
Connected Items ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Department of Homeland Security (DHS) ,
Drones ,
Educational Institutions ,
Information Technology ,
Internet of Things ,
Iran ,
Malware ,
Medical Devices ,
Personal Data ,
Pharmaceutical Industry ,
Popular ,
Universities
The tension with Iran has generally increased, it has been reported that the U.S. has launched a cyber-attack against Iran, and in retaliation, the risk of Iranian-backed wiper malware attacks against U.S. businesses and...more
7/3/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Department of Homeland Security (DHS) ,
Hackers ,
Information Technology ,
Iran ,
Malware ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
Vulnerability Assessments
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
6/28/2019
/ Bring Your Own Device (BYOD) ,
Cell Phones ,
Confidential Information ,
Data-Sharing ,
Information Technology ,
Location Privacy ,
Mobile Apps ,
Mobile Device Management ,
Mobile Devices ,
Mobile Privacy ,
Personal Data ,
Privacy Concerns ,
Proprietary Information ,
Risk Management ,
Vulnerability Assessments
Security researchers have warned municipalities repeatedly about how they are being targeted with ransomware, that they are at high risk, and the need to make data security a high priority....more
6/28/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
Municipalities ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
6/7/2019
/ California Consumer Privacy Act (CCPA) ,
China ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Exploitation ,
Extortion ,
FBI ,
Genetic Materials ,
Genetic Testing ,
Hackers ,
Information Technology ,
Malware ,
OIG ,
Online Safety for Children ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Quest Diagnostics ,
Vulnerable Victims
Another day in the healthc are industry, another big data breach.
This week, Quest Diagnostics announced in a security filing with the Securities and Exchange Commission, that a collection agency vendor that it uses for...more