Tax identity theft continues to be a significant problem for taxpayers. Tax identity theft occurs when criminals use the personal information of individuals and file fraudulent tax returns before the taxpayer does, requesting...more
2/6/2020
/ Cyber Crimes ,
Federal Trade Commission (FTC) ,
Identity Theft ,
Income Taxes ,
IRS ,
Payroll Records ,
Personally Identifiable Information ,
Social Security Numbers ,
Tax Fraud ,
Tax Planning ,
Tax Returns ,
W-2
Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting...more
2/5/2020
/ China ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Infectious Diseases ,
Information Security ,
Malware ,
Personally Identifiable Information ,
Public Health ,
Vulnerable Victims ,
World Health Organization
A new report published by Coveware concludes that companies hit with ransomware attacks spend an average of 16 days recovering from the attack. Think about being offline and unable to do business for 16 business days. It is...more
1/31/2020
/ Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Drones ,
Hackers ,
Internet of Things ,
Ransomware ,
Request For Information ,
Risk Management ,
Super Bowl ,
Unmanned Aircraft Systems ,
USPS
I am on vacation this week in beautiful Jackson Hole. The skiing is epic, the restaurants amazing, 1921 silver dollars inlaid in the tops of two bars, elk and moose abound, and I’ve had a sighting of several coyotes, a...more
A new report published by Coveware concludes that companies hit with ransomware attacks spend an average of 16 days recovering from the attack. Think about being offline and unable to do business for 16 business days. It is...more
It’s getting difficult to keep up with the jargon of all of the new digital scams. The SaaSes in the beginning became regular business terms, such as Software-as-a-Service (SaaS), and Business Processes-as-aService (BPaaS)....more
1/24/2020
/ Artificial Intelligence ,
Cyber Crimes ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data-Sharing ,
Health Insurance Portability and Accountability Act (HIPAA) ,
NIST ,
Online Platforms ,
Personal Data ,
PHI ,
Risk Management ,
SaaS
Some app developers know more about our health than our doctors do. Take, for instance, FitBit, which is attached to our wrist and measuring in real time our temperature, our heart rate, our steps and whether we have had...more
1/24/2020
/ 23andMe ,
Consumer Privacy Rights ,
Data Collection ,
Data Management ,
Data Protection ,
Data-Sharing ,
DNA ,
Electronic Medical Records ,
Fitbit ,
Genetic Materials ,
Genetic Testing ,
Health Care Providers ,
Health Information Technologies ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Technology ,
Mobile Apps ,
Patients ,
Personal Data ,
Personally Identifiable Information ,
Telehealth ,
Telemedicine
It’s getting difficult to keep up with the jargon of all of the new digital scams. The SaaSes in the beginning became regular business terms, such as Software-as-a-Service (SaaS), and Business Processes-as-a-Service (BPaaS)....more
1/24/2020
/ Amazon Marketplace ,
Apple Pay ,
Compliance-as-a-Solution (CaaS) ,
Cyber Crimes ,
Data Management ,
Data Protection ,
Debit and Credit Card Transactions ,
Financial Transactions ,
Malware ,
Payment Processors ,
PayPal ,
Phishing Scams ,
SaaS ,
Scams ,
Vulnerability Assessments ,
Vulnerable Victims
The same week that the National Institute of Standards and Technology came out with its Privacy Framework [view related post], highlighting how privacy is basically a conundrum, news articles also highlighted a new...more
The National Institute of Standards and Technology (NIST) released its first privacy framework tool (the “Privacy Framework”) on January 16, 2020. In the Executive Summary...more
1/23/2020
/ Consumer Privacy Rights ,
Cybersecurity ,
Cybersecurity Framework ,
Data Privacy ,
Data Protection ,
Data Security ,
Framework Agreement ,
NIST ,
Personal Data ,
Popular ,
Risk Management
FBI Warns of Retaliatory Cyber-Attack from Iran -
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This...more
1/17/2020
/ Assassinations ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Dating Services ,
Drones ,
Federal Aviation Administration (FAA) ,
GAO ,
Hackers ,
Information Management ,
Iran ,
Mobile Apps ,
Online Reviews ,
Personal Data ,
Personally Identifiable Information ,
Research Reports ,
Risk Management ,
State Attorneys General ,
Unmanned Aircraft Systems ,
Vulnerability Assessments ,
Yelp
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
1/17/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Information Management ,
Infrastructure ,
Iran ,
Phishing Scams ,
Popular ,
Retaliation ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
I don’t know much about dating apps. I met my husband decades ago, long before the Internet, and the old-fashioned way—in college. But I know people who have used them, have been happy with them, have found their life partner...more
1/16/2020
/ Ashley Madison ,
Consumer Privacy Rights ,
Cookies ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Dating Services ,
Internet ,
Mobile App Privacy Guidelines ,
Mobile Apps ,
Online Platforms ,
Personally Identifiable Information ,
Privacy Policy ,
State Attorneys General ,
Web Tracking ,
Websites
Department of Homeland Security Warns of Cyber-Attacks by Iran -
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020, alerting the...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Services Industry ,
Foreign Relations ,
Hackers ,
Information Sharing ,
Iran ,
Microsoft ,
NYDFS ,
Operating System Developers ,
Personally Identifiable Information ,
Risk Management ,
Risk Mitigation ,
Unmanned Aircraft Systems ,
Vulnerability Assessments
Pretty much the only time I don’t feel like I am Chicken Little predicting a massive cyber-attack is when I am with my colleagues at the FBI, Secret Service, NSA and my students in the Brown Executive Masters of Cybersecurity...more
1/10/2020
/ Assassinations ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
Foreign Relations ,
Hackers ,
Information Technology ,
Iran ,
Malware ,
NYDFS ,
Risk Management ,
Risk Mitigation ,
Vulnerability Assessments
Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Health Care Providers ,
Healthcare Facilities ,
Hospitals ,
Infrastructure ,
Iran ,
Municipalities ,
Phishing Scams ,
Risk Management ,
Risk Mitigation ,
Social Media ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) is warning critical infrastructure operators to be on high alert for Iranian backed cyber-attacks because of the vulnerability of state and municipal computer systems, they are at...more
1/10/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Municipalities ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020 alerting the public that Iran poses a cyber terrorism threat to the United States...more
1/9/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
After much anticipation and trepidation, the California Consumer Privacy Act (CCPA) went into effect on January 1, 2020. Many companies are understandably still grappling with the details of the law, the amendments, and the...more
1/3/2020
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Deletion ,
Data Management ,
Data Privacy ,
Data Protection ,
Information Governance ,
Opt-In ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Right to Delete ,
Rulemaking Process ,
State and Local Government
It is being reported that LifeLabs, a Canadian lab company that is the largest provider of laboratory diagnostics and lab testing services in Canada, recently paid an undisclosed ransom to hackers who compromised its computer...more
12/23/2019
/ Biometric Information ,
Clinical Laboratories ,
Connected Cars ,
Connected Items ,
Criminal Conspiracy ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Electronic Medical Records ,
Extradition ,
Hackers ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
Identity Theft ,
Information Technology ,
Malware ,
OCR ,
Personally Identifiable Information ,
PHI ,
Ransomware ,
Settlement
It is being reported that LifeLabs, a Canadian lab company that is the largest provider of laboratory diagnostics and lab testing services in Canada, recently paid an undisclosed ransom to hackers who compromised its computer...more
An Illinois employee of Power Solutions International Inc. (Power Solutions) filed suit against his employer alleging violations of the Illinois Biometric Information Privacy Act (BIPA) when Power Solutions collected his...more
12/20/2019
/ Biometric Information ,
Biometric Information Privacy Act ,
Data Collection ,
Data Privacy ,
Employer Liability Issues ,
Fingerprints ,
Notice Requirements ,
Personally Identifiable Information ,
Preemption ,
Prior Express Consent ,
Statutory Interpretation ,
Workers Compensation Act ,
Workplace Injury
Three million fraud cases were reported to the FTC in 2018, and 444,602 of them involved identity theft. These reported cases (just think of how high the statistic would be if all cases were reported) amounts to the third...more
12/19/2019
/ Credit Cards ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Debit and Credit Card Transactions ,
Federal Trade Commission (FTC) ,
Financial Services Industry ,
Hackers ,
Identity Theft ,
Information Security ,
Personally Identifiable Information ,
Risk Management ,
Vulnerability Assessments
Louisiana Governor John Bel Edwards activated the State’s cybersecurity team recently after several State offices’ computers started acting strangely. The IT team identified an intrusion of Ryuk ransomware and which programs...more
12/13/2019
/ Connected Items ,
Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Information Technology ,
Municipalities ,
Personally Identifiable Information ,
PHI ,
Ransomware ,
Smart Devices ,
State and Local Government ,
Vulnerability Assessments
Just hours after the shooting incident at the Pensacola Air Station last week, city officials in Pensacola discovered that the city was the victim of a ransomware attack....more