News & Analysis as of

Cyber Attacks Encryption Data Security

Goodwin

HHS Proposes Major Revisions to HIPAA Security Rule

Goodwin on

On December 27, 2024, the Department of Health and Human Services (HHS) issued a notice of proposed rulemaking (NPRM) related to the Security Rule under the Health Insurance Portability and Accountability Act (HIPAA). ...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Fisher Phillips

Ransomware Costs Businesses Record-High $1 Billion in 2023: Your 5-Step Plan to Prevent Attacks in 2024

Fisher Phillips on

2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more

Lowenstein Sandler LLP

Ransomware Case Signifies Shift In Cyber Insurers' Stance

Lowenstein Sandler LLP on

Ransomware attacks are on the rise. Lax security measures, which have become more acute in the work-from-home environment, continue to be exploited. Companies' systems are hacked into, their data is encrypted, and they face...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

Troutman Pepper Locke

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper Locke on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

Faegre Drinker Biddle & Reath LLP

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCAM). NCAM serves as a timely reminder to continue to assess and improve organizational cybersecurity. In honor of NCAM, here are five fundamental steps that every...more

Sunstein LLP

Twenty Years Under the Microscope: A Small Business, a Data Breach and the FTC

Sunstein LLP on

James Grago has a nice business going. He runs a website called ClixSense.com that permits users to earn money by completing surveys and watching advertisements. Revenues grew from $6.7 million in 2015 to $9.1 million in...more

Akin Gump Strauss Hauer & Feld LLP

Recent FTC Settlements Highlight Risks of Flawed Information Security Practices and Related Representations

In a set of recent settlements, the Federal Trade Commission (the FTC or Commission) resolved charges against two companies, ClixSense and D-Link, for failing to provide reasonable security and to live up to their data...more

Fisher Phillips

Security Breaches In Schools: 10 Steps To Protect Your Information

Fisher Phillips on

California’s San Diego Unified School District recently disclosed that it had sustained a data breach when multiple phishing emails from malicious hackers were used to gather login information of staff members throughout the...more

The Volkov Law Group

It is 2019 . . . Do You Know Where Your Data Is?

The Volkov Law Group on

We are living in a rapidly changing world (trite, I know) where companies have to focus on data privacy and security for a variety of reasons. Consumers and constituents are concerned about the safety and privacy of personal...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more

Ward and Smith, P.A.

Wrapping Your Privacy Practices Up with a Bow

Ward and Smith, P.A. on

For many companies, the "hap-happiest season of all" coincides with the busiest season of all. Business owners and employees are racing to fill customer orders in time for the holidays, which also means an avalanche of new...more

Bradley Arant Boult Cummings LLP

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

Morrison & Foerster LLP - Social Media

N.Y.’s New Cybersecurity Regulations: What Financial Services Companies Need to Know

With corporate data security breaches on the rise, the New York State Department of Financial Services (NYDFS) has adopted rules requiring financial institutions to take certain measures to safeguard their data and inform...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

Mintz - Health Care Viewpoints

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

Robinson+Cole Data Privacy + Security Insider

Cybersecurity + Law Enforcement: The Cutting Edge Symposium | Friday, October 16, 2015 RWU Law Bristol, RI

Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

Mintz - Health Care Viewpoints

Class Action Suit Filed Against UCLA After It Suffers Massive Data Breach Affecting 4.5 Million Individuals

In yet another data breach affecting millions of individuals, UCLA Health System (“UCLA”) reported on July 17, 2015, that hackers had accessed portions of its health network that contained personal information, including...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide