For those of you that have websites that process online payments (such as retail, hospitality, health care, entertainment and utilities), the Federal Bureau of Investigation (FBI) recently issued a warning about e-skimming...more
The Department of Veterans Affairs’ Office of Inspector General (VA OIG) recently completed an audit of the VA’s Milwaukee Regional Office after it was tipped off by a whistleblower about the exposure of sensitive information...more
10/31/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Veterans Affairs ,
Federal Trade Commission (FTC) ,
Hackers ,
Identity Theft ,
Information Security ,
Personally Identifiable Information ,
Security Audits ,
Veterans ,
Vulnerability Assessments ,
Vulnerable Victims ,
Whistleblowers
TrialWorks, a legal case management software platform announced to its customers on October 13, 2019, that it was experiencing a hosting outage at their data center and that they would provide updates as they learned more...more
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities in order to listen to users’ every word to...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Cyber-Stalking ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Eavesdropping ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Mobile Apps ,
OCR ,
PHI ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
Although Amazon and Google respond to reports of vulnerabilities in popular home smart assistants Alexa and Google Home, hackers continually work hard to exploit any vulnerabilities to be able to listen to users’ every word...more
10/25/2019
/ Amazon Marketplace ,
Connected Items ,
Cyber Attacks ,
Data Privacy ,
Eavesdropping ,
Google ,
Hackers ,
Information Security ,
Information Technology ,
Phishing Scams ,
Popular ,
Risk Management ,
Smart Devices ,
Vulnerability Assessments
A reporter from the Philadelphia Inquirer discovered that sensitive data of hepatitis patients were accessible online through a Philadelphia Department of Public Health (DPH) website tool without the need for a password. The...more
10/25/2019
/ Data Breach ,
Data Protection ,
Government Entities ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
Online Platforms ,
Personally Identifiable Information ,
PHI ,
Public Health ,
Vulnerability Assessments ,
Websites
The pace at which data privacy and security laws are changing continues to move at warp speed. Back in the day, I would keep track of all privacy and security bills in state legislatures and Congress; about 10 years ago, I...more
As most of you know, I rarely download an app. However, here’s one I just downloaded and here’s why. The Jumbo Privacy app, available in the Apple store, is all about providing consumers with a way to audit their privacy and...more
10/24/2019
/ Apple ,
Dark Web ,
Data Protection ,
Information Security ,
Mobile Apps ,
Mobile Device Management ,
Mobile Devices ,
Personally Identifiable Information ,
Privacy Concerns ,
Risk Management ,
Security Audits
The Office for Civil Rights (OCR) announced on October 23, 2019, that Jackson Health System (“Jackson”), a not for profit hospital system comprised of six hospitals, urgent care centers, nursing facilities and primary care...more
10/24/2019
/ Data Breach ,
Electronic Medical Records ,
Enforcement Actions ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
HIPAA Breach ,
Information Technology ,
Notice of Determination (NODs) ,
OCR ,
Personally Identifiable Information ,
PHI ,
Risk Assessment
A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks.
...more
10/18/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Information Technology ,
National Security Agency (NSA) ,
Network Security ,
Personal Data ,
Personally Identifiable Information ,
Virtual Private Networks ,
Vulnerability Assessments
The National Security Agency issued an advisory last week to warn companies and users that nation-state actors are actively exploiting vulnerabilities in several virtual private network (VPN) service applications to obtain...more
10/18/2019
/ Advisory Opinions ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Information Security ,
Information Technology ,
National Security Agency (NSA) ,
Virtual Private Networks ,
Vulnerability Assessments
A recent Ponemon Institute study finds that small and mid-sized businesses continue to be targeted by cybercriminals, and are struggling to direct an appropriate amount of resources to combat the attacks....more
10/17/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
Vulnerability Assessments
Everyone should be aware that October is National Cybersecurity Awareness Month. TechNewsWorld is urging all users to “Own IT,” which “means staying safe on social media, updating privacy settings, and keeping tabs on apps....more
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Americans with Disabilities Act (ADA) ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Dentists ,
Department of Defense (DOD) ,
Drones ,
FBI ,
Federal Aviation Administration (FAA) ,
Federal Contractors ,
Hackers ,
Health Care Providers ,
OCR ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
SCOTUS ,
Title III ,
Unmanned Aircraft Systems ,
UPS ,
Vulnerability Assessments ,
Websites ,
WhatsApp
Elite Dental Associates (Elite), located in Dallas, Texas has agreed to settle alleged HIPAA violations with the Office for Civil Rights (OCR) for $10,000....more
10/14/2019
/ Cybersecurity ,
Data Breach ,
Dentists ,
Enforcement Actions ,
Fines ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
HIPAA Breach ,
OCR ,
Personally Identifiable Information ,
PHI ,
Policies and Procedures ,
Privacy Rule
The Office of the Under Secretary of Defense for Acquisition and Sustainment has been on a fast track mission to shore up the cybersecurity measures of defense contractors and the supply chain to the Department of Defense...more
10/14/2019
/ Certifications ,
Cooperative Compliance Regime ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Defense (DOD) ,
Federal Contractors ,
Regulatory Requirements ,
Subcontractors ,
Vendors
Last week was a busy week for the California Consumer Privacy Act (CCPA), as Attorney General Xavier Becerra released draft regulations on October 10 and Governor Newsom signed several pending CCPA amendments into law on...more
10/14/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
New Legislation ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Rulemaking Process ,
State and Local Government
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Business Interruption ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Incident Response Plans ,
Information Technology ,
Internet ,
Mobile Apps ,
Online Platforms ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
WhatsApp has announced that it has patched a vulnerability that would have allowed hackers to access with malware the chat history of users. Android 8.1 and 9 could have been susceptible to the attack. However, WhatsApp is...more
Consistent with our experience, security firm McAfee has confirmed in a report that ransomware attacks have doubled in 2019. Medical providers have been hit hard this year, and one provider, Wood Ranch Medical, located in...more
10/7/2019
/ Biometric Information ,
Biometric Information Privacy Act ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Drones ,
Energy Sector ,
Facial Recognition Technology ,
Fraud Alerts ,
GAO ,
Genetic Testing ,
Google ,
Hackers ,
Health Care Providers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Power Grid ,
Ransomware ,
Scams ,
Spam ,
Unmanned Aircraft Systems
Another day, another suit against a brand name for allegations of violation of the Illinois Biometric Information Privacy Act (BIPA). Plaintiffs’ attorneys are having a field day filing class action lawsuits based on BIPA....more
Consistent with our experience, security firm McAfee has confirmed in a report that ransomware attacks have doubled in 2019. Medical providers have been hit hard this year, and one provider, Wood Ranch Medical, located in...more
10/4/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Electronic Medical Records ,
Hackers ,
Health Care Providers ,
Healthcare ,
HIPAA Breach ,
Information Technology ,
Personally Identifiable Information ,
PHI ,
Ransomware
I have been hanging out a lot with Chief Information Officers (CIO) and Chief Information Security Officers (CISO) these days at speaking engagements and conferences, as October – National Cybersecurity month – is always...more
10/4/2019
/ Chief Information Security Officer (CISO) ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Malware ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Spam
Everyone knows how I feel about those home genetic testing kits—most people don’t understand that when they send their DNA to a private company that it is not protected by HIPAA or any other law, and the company can legally...more
Many cities in the United States utilize a self-pay portal for residents to pay bills online, known as Click2Gov. Click2Gov was compromised in 2017 and 2018, when hackers were able to access over 300,000 payment cards and...more
9/30/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Dating Services ,
Drones ,
Enforcement Actions ,
False Advertising ,
Federal Trade Commission (FTC) ,
Fraudulent Marketing ,
Hackers ,
Medical Devices ,
Online Banking ,
Personally Identifiable Information ,
Popular ,
Social Networks ,
Unmanned Aircraft Systems ,
Vimeo