Latest Posts › Popular

Share:

Six Lessons For Your Organization From the SolarWinds Affair

The major current cybersecurity story involves a popular SolarWinds network managing software package, Orion. A sophisticated actor, with the signatures of a nation state, infiltrated Orion in a software update. Once inside,...more

2021 and Beyond: The Top Ten Upcoming Changes In Privacy And Cyber Security

2020 was a year like no other. From an unprecedented “work from home” shift to a blockbuster European court ruling to a mammoth cyber attack, businesses scrambled to adapt to an endless series of cyber challenges. 2021 shows...more

New York Fires First Salvo Under Cybersecurity Law

The New York Department of Financial Services (NYDFS) has launched its first enforcement action under New York’s Cybersecurity law for financial services, so-called Part 500. Part 500 requires NYDFS licensed institutions to...more

The Top Ten Employer Cybersecurity Concerns For Employees Regarding Remote Work

Employers are responding to COVID-19 by allowing, and even mandating remote working. Companies ranging from Amazon, Microsoft, and Google to local design shops have asked employees to work from home. While increasingly common...more

HIPAA Breach Settles for $1M in First Settlement Involving State Attorneys General

Last week, Indiana based Medical Informatics Engineering, Inc. (MIE) agreed to pay $100,000 to the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR). MIE provides electronic health record and related...more

New Regulatory Developments in Blockchain Finance

Blockchain technology combines several features of existing financial infrastructure. It is partly a mass repository of historical transactions, partly a decentralized clearinghouse, and partly a digital currency. It is also...more

Six Months In, Privacy Shield Is Battered But Holding: Three Notable Developments in U.S-E.U. Data Transfers

The United States has traditionally taken a libertarian approach to data privacy: “what is not forbidden is permitted.” Outside sensitive sectors such as health (HIPAA) and finance (GLBA), the United States was historically...more

Locked in Sixty Seconds: Ransomware, Remote Access, and the Brave New Internet of Things

A few months ago, we analyzed ransomware incidents and offered some suggestions for handling an episode. Ransomware is a cyberattack in which a hacker uses malware to take control of computer systems. The system owner is...more

What is Blockchain? Why Does It Matter? Observations As North Carolina’s Virtual Currency Legislation Goes Into Effect

J. K. Rowling’s world of Harry Potter included an array of amazing artifacts; our personal favorites were the books and pictures that changed themselves. Two decades later, a world of Kindles and iPads echoes the wonders of...more

Ten Things You Need To Know About Ransomware

In 2013, hackers attacked a venerable Swansea, Massachusetts institution via ransomware. Ransomware is software that locks users out of computers or specific files until the victim pays a “fee” to release the lock. Such...more

W-2 Phishing Scams: Don’t Take the Bait

In recent weeks, hundreds of businesses around the country have been hit by an email “phishing” scam that is both brilliant in its exploitation of workplace power dynamics and potentially devastating in its effects. This...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide