News & Analysis as of

Cybersecurity Multi-Factor Authentication Phishing Scams

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

HaystackID

Inside CyberCX’s 2025 DFIR Report: MFA Failures and Espionage Risks Revealed

HaystackID on

The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more

StoneTurn

The Evolution of Cybercrime: How to Stay Safe from AI-Driven Fraud

StoneTurn on

A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more

Robinson+Cole Data Privacy + Security Insider

Phishing Attacks – Anyone Can Get Pwned

HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more

Jackson Lewis P.C.

AI versus MFA

Jackson Lewis P.C. on

Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more

K2 Integrity

Cybersecurity Awareness Month: Creating and Managing Long, Unique Passwords

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication - Update

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Foodman CPAs & Advisors

Estafas Navideñas Impulsadas Por La Inteligencia Artificial

Foodman CPAs & Advisors on

El 22/11/23, la Oficina de Ciberseguridad y Protección de Infraestructura Crítica del Departamento del Tesoro de los EE. UU. publicó un Aviso que brinda consejos a los consumidores para evitar convertirse en víctimas de...more

Foodman CPAs & Advisors

Holiday Scams Propelled By Artificial Intelligence

Foodman CPAs & Advisors on

On 11/22/23, the U.S. Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection office released an advisory providing tips to consumers to avoid becoming the victim of cyber or online...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

K2 Integrity

Cybersecurity Awareness Month: Maintaining Good Password Hygiene

K2 Integrity on

It’s important to stay secure throughout the year, and in October, cybersecurity takes on even more significance: since 2004, it has been designated as Cybersecurity Awareness Month. In the 20 years since its inception,...more

Flaster Greenberg PC

7 Key Practices Companies Should Implement to Ensure Cyber Safety in the Age of Remote Work

Flaster Greenberg PC on

Cybersecurity is critically important in the age of remote work. With more people working from home and accessing company systems and data remotely, the potential for cyberattacks and data breaches has increased...more

BakerHostetler

Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects and analyzes various metrics about the incident response matters we handle. In 2022, we handled over 1,160 incidents. The most striking trends we saw across those incidents were an overall...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Ankura

When it Comes to Cybersecurity, ChatGPT Needs to Go Back to School

Ankura on

With interest in Artificial intelligence (AI) soaring, we were curious to determine how well a very popular ‘generative AI’ tool, ChatGPT, could perform at identifying the leading causes of cybersecurity incidents experienced...more

Bass, Berry & Sims PLC

Privacy Peril: Red, White and Secure

Bass, Berry & Sims PLC on

Enable multifactor authentication. Use a trusted password manager. Use strong passwords. Recognize and report phishing. Update your software regularly....more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Ankura

A Cyber Threat Analysis of the Russia-Ukraine Conflict

Ankura on

The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide