U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more
2/17/2022
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Network Security ,
Personally Identifiable Information ,
Popular ,
Russia ,
Threat Management ,
Vulnerability Assessments
CYBERSECURITY -
FBI Warns Olympics/Paralympics Participants of Cyber “Activities” -
On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the...more
2/4/2022
/ Consumer Privacy Rights ,
Customer-Loyalty Programs ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Drones ,
FBI ,
Information Governance ,
Internet of Things ,
Personally Identifiable Information ,
Popular ,
Vulnerability Assessments
On January 31, 2022, the FBI issued a Private Industry Notification entitled “Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics,” warning those associated with the Olympics...more
2/4/2022
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
FBI ,
Hackers ,
Malware ,
Olympics ,
Personally Identifiable Information ,
Ransomware ,
Vulnerability Assessments
CYBERSECURITY -
CISA Warns “Every Organization” in U.S. to Assess + Respond to Cyber Risks -
The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the...more
1/28/2022
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Drones ,
FERC ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Robots ,
Transmission Grid ,
Vulnerability Assessments
It’s very hard to keep up with digital and crypto lingo. But if you are dabbling in crypto, you need to know about rug pulls. What is a rug pull you ask? According to blogger Migi Delfin, “A rug pull is a fraud scheme that...more
1/28/2022
/ Bitcoin ,
Cryptocurrency ,
Digital Currency ,
Financial Crimes ,
Financial Fraud ,
Hackers ,
Risk Management ,
Smart Contracts ,
Token Sales ,
Virtual Currency ,
Vulnerability Assessments
The Cybersecurity & Infrastructure Security Agency (CISA) recently issued another warning to “every organization” in the U.S. about cybersecurity risks during the ongoing escalation of tension between the U.S. and Russia over...more
1/27/2022
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
New Guidance ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
Russia ,
Ukraine ,
Vulnerability Assessments
CYBERSECURITY -
ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 -
ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more
1/21/2022
/ Automation Systems ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Theft ,
FBI ,
Hackers ,
Health Care Providers ,
Japan ,
Malware ,
Popular ,
QR Codes ,
Vessels ,
Vulnerability Assessments
ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device Evaluation group, “the Top 10 Health Technology Hazards list identifies the potential sources of danger...more
1/20/2022
/ Annual Reports ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Protection ,
Health Care Providers ,
Health Information Technologies ,
Healthcare ,
Popular ,
Vulnerability Assessments
Passwords are so difficult to remember. We all know we shouldn’t use the same or similar passwords across platforms. Stolen password credentials are dumped on the dark web and criminals use the stolen passwords to steal other...more
1/20/2022
/ Cyber Attacks ,
Cybersecurity ,
Darknet ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Identity Theft ,
Malware ,
Passwords ,
Personally Identifiable Information ,
Vulnerability Assessments
The FBI’s Internet Crime Complaint Center (IC3) recently issued a warning alerting consumers that scammers are using malicious QR Codes to reroute unsuspecting customers to malicious sites to try to steal their data....more
Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on....more
1/14/2022
/ China ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
The Cybersecurity & Infrastructure Security Agency (CISA), jointly with the FBI and NSA, issued a Cybersecurity Advisory on January 22, 2022, to warn organizations, especially critical infrastructure operators, to be on...more
1/14/2022
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
National Security Agency (NSA) ,
Risk Management ,
Russia ,
Vulnerability Assessments
CYBERSECURITY -
FTC Warns Companies of Enforcement for Failing to Patch Log4j Vulnerability -
In what I would describe as an unusual but interesting move by the Federal Trade Commission (FTC), on January 4, 2022, it...more
1/7/2022
/ Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
Federal Trade Commission (FTC) ,
Hackers ,
Personally Identifiable Information ,
Search Engines ,
Vulnerability Assessments
In what I would describe as an unusual but interesting move by the Federal Trade Commission (FTC), on January 4, 2022, it issued a warning to companies “to remediate Log4j security vulnerability” or face an enforcement action...more
Another fall-out from the pandemic is that impersonation fraud has increased dramatically. According to the Federal Trade Commission, “the COVID-19 pandemic has spurred a sharp spike in impersonation fraud, as scammers...more
CYBERSECURITY -
Update on Apache log4j and Kronos Security Incidents -
It was a crazy weekend for cyber-attacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and...more
12/17/2021
/ COPPA ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Information Technology ,
Ransomware ,
Vulnerability Assessments
It was a crazy weekend for cyberattacks. People seem surprised, but those of us in the industry aren’t surprised one bit. It is very logical and foreseeable that hackers are leveraging attacks that have maximum disruption on...more
12/17/2021
/ Cloud Computing ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Popular ,
Risk Management ,
Software ,
Vulnerability Assessments
The Division of Legislative Automated Systems, which provides IT services to the Virginia General Assembly (the Assembly), detected a ransomware attack on December 10, 2021, that included “extremely sophisticated malware”...more
12/16/2021
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
General Assembly ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Virginia ,
Vulnerability Assessments
CYBERSECURITY -
Joint CISA/FBI Alert on Vulnerability in Zoho ManageEngine ServiceDesk Plus -
On December 6, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI)...more
12/13/2021
/ Consumer Privacy Rights ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
FBI ,
Gift-Cards ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Infectious Diseases ,
Information Governance ,
Personally Identifiable Information ,
Popular ,
Scams ,
Vaccine Passports ,
Vulnerability Assessments
On December 6, 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) updated a previously issued Alert entitled APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine...more
A new report issued by Sophos, The State of Ransomware in Education 2021, found that the education sector as a whole experienced a higher level of ransomware attacks than any other industry in 2020....more
12/3/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Educational Institutions ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Vulnerability Assessments
Researchers at Mandiant have recently reported that a new ransomware group calling itself Sabbath appears to be the rebranded group Arcane and “picked up their pace” in November....more
12/2/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Educational Institutions ,
Hackers ,
Health Care Providers ,
Information Technology ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
The Cybersecurity & Infrastructure Security Agency (CISA) and the FBI issued a joint Alert this week, entitled “Reminder for Critical Infrastructure to Stay Vigilant Against Threats During Holidays and Weekends” outlining...more
11/24/2021
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
FBI ,
Holidays ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Ransomware ,
Risk Management ,
Vulnerability Assessments
CYBERSECURITY -
CISA Issues Incident Response + Vulnerability Response Playbooks for Executive Branch -
The Cybersecurity & Infrastructure Security Agency (CISA) issued the Cybersecurity Incident & Vulnerability Response...more
11/19/2021
/ Connected Items ,
Consumer Privacy Rights ,
Costco ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Debit and Credit Card Transactions ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Governance ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Vulnerability Assessments
The Cybersecurity & Infrastructure Security Agency (CISA) issued the Cybersecurity Incident & Vulnerability Response Playbooks: Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability...more