News & Analysis as of

Cybersecurity Data Theft

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

ArentFox Schiff

AI in Family Offices: A Closer Look at Privacy, Confidentiality, and Fiduciary Responsibility

ArentFox Schiff on

The integration of artificial intelligence (AI) has revolutionized various industries, offering efficiency, accuracy, and convenience. In the realm of estate planning and family offices, the integration of AI technologies has...more

Alston & Bird

Top 10 Issues General Counsel Need to Know About Ransomware in 2024

Alston & Bird on

Threat actors are evolving. Our Privacy, Cyber & Data Strategy Team explains how ransomware gangs have changed their tactics and how companies can respond to the threat while navigating new scrutiny from investors and...more

Seyfarth Shaw LLP

Cyber Strategy: HHS Weighs in on Cybersecurity in the Healthcare Industry

Seyfarth Shaw LLP on

Seyfarth Synopsis: The health care sector faces escalating cybersecurity risks given its size, technological dependence and the sensitive nature of data used therein. According to the U.S. Department of Health and Human...more

DRI

Defending Against Employee Defection: The Intersectionality of Cybersecurity and Trade Secret Protections in the Digital Age

DRI on

Cybersecurity and data protection often involve the protection of data and intellectual property (“IP”), such as trade secrets, from outside threats, but is your company prepared to defend against threats from the inside? The...more

Foodman CPAs & Advisors

Data Theft Warning Signs From IRS

Foodman CPAs & Advisors on

IRS Awareness Campaign for the Summer 2023 focuses on data theft signs and the importance of staying alert against new and ongoing threats of tax-related identity in order to protect the taxpayer and the tax professional. ...more

Baker Donelson

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

Baker Donelson on

On May 31, 2023, renowned managed file transfer solution provider Ipswitch, Inc. revealed a zero-day vulnerability in its flagship solution, MOVEit Transfer, that can enable mass data theft from thousands of organizations....more

BakerHostetler

I Won’t Get Fooled Again: Measures Universities Should Take to Combat North Korea’s Use of Spearphishing Campaigns to Access Their...

BakerHostetler on

On June 1, the FBI, the U.S. Department of State and the National Security Agency, together with the Republic of Korea’s (ROK) National Intelligence Service, National Police Agency and Ministry of Foreign Affairs, issued a...more

Kelley Drye & Warren LLP

[Webinar] 2022 WORKing Lunch Series: Protecting Your (Human) Resources: Fighting Business Email Compromise and Ransomware -...

HR employees are, willingly or not, the guardians of the company’s most sensitive collection of data—its employee’s personal information. Cybercriminals often perceive the human resources department as the perfect gateway...more

Ankura

The Metaverse – What Does It Mean for Data Privacy and Information Security?

Ankura on

What are the implications for data privacy and information security in the Metaverse? The metaverse will create an “even more immersive and embodied Internet”, where users can meet friends, collaborate with colleagues, play...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - January 2022 #3

Robinson & Cole LLP on

CYBERSECURITY - ECRI Names Cybersecurity Attacks as Top Health Technology Hazard for 2022 - ECRI has been publishing its annual report of health technology hazards for the past 15 years. According to ECRI’s Device...more

Hinshaw & Culbertson - Law Firm Cyber Alerts

Practical Tips to Mitigate the Risk of Being Hacked by Fake IRS or Google Voice Scams

Risk Management Question - What are some of the newest hacking scams that may affect law firms and other businesses? The Issue - On October 27, 2021, the Federal Trade Commission (FTC) issued warnings to be on alert...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Fisher Phillips

Cybercriminals Target Healthcare Industry During The Pandemic

Fisher Phillips on

Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 20, Number 11. Privacy Briefs: November 2020

Report on Patient Privacy 20, no. 11 (November 2020) - HHS Office of the National Coordinator (ONC) for Health Information Technology (ONC) is giving health care organizations more time to meet new rules on information...more

BakerHostetler

Warning of Cybersecurity Threat to Healthcare Sector – Imminent Threat of Ransomware

BakerHostetler on

BakerHostetler is closely monitoring a Cybersecurity Advisory issued jointly by several government agencies including the United States Department of Health and Human Services (HHS) and the FBI, on October 28. ...more

American Conference Institute (ACI)

[Virtual Event] 18th NATIONAL FORUM ON ERISA Litigation - November 18th - 19th, 10:45 am - 1:30 pm EST

Join us virtually to ensure that you are equipped with the latest updates and strategies to prevent, manage and defend against rising, costly ERISA disputes. There has never been a more critical time to “compare notes”...more

NAVEX

5 Ways National Cybersecurity Month Is Like Halloween

NAVEX on

October is best known for Halloween, but October also happens to be National Cybersecurity Awareness Month. It’s a time to focus on how cybersecurity is a shared responsibility, and we all must work together to protect and...more

Shumaker, Loop & Kendrick, LLP

Client Alert: The OCR Gives Practices 1.5 Million Reasons to Prioritize HIPAA Compliance

Today the Office of Civil Rights (OCR) at the U.S. Department of Health and Human Resources announced that a Georgia orthopedic clinic agreed to pay $1.5 million and adopt a two-year corrective action plan to settle potential...more

Faegre Drinker Biddle & Reath LLP

Newly-Discovered Vulnerability Highlights the Security Concerns Surrounding Bluetooth Technology

A recent report by researchers at the Helmholz Center for Information Security (CISPA), Singapore University of Technology and Design, and the University of Oxford has revealed that Bluetooth technology is vulnerable to a new...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 5: Create a Data Theft Recovery Plan

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 3: Avoid E-mail Phishing Scams

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #198: Cybersecurity for Tax Professionals

This week, I was honored to again have the opportunity to participate as a speaker at the Internal Revenue Service’s Nationwide Tax Forum 2019 in Washington, D.C. Through a generous grant provided by the American Coalition...more

50 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide