News & Analysis as of

Data Breach Bad Actors

StoneTurn

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

StoneTurn on

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Jackson Lewis P.C.

Multi-factor Authentication (MFA) Bypassed to Permit Data Breach

Jackson Lewis P.C. on

As organizations continue to take steps to prevent cyberattacks, a near-universal recommendation is that they should implement multi-factor authentication (MFA), and for good reason. Organizations subject to the updated FTC...more

Cozen O'Connor

23andme Is Asked to Confirm if Data Security Is Part of Its DNA

Cozen O'Connor on

Connecticut AG William Tong sent an inquiry letter to 23andMe, Inc. asking the genetic testing and ancestry company for more information regarding an October 6th press release in which it disclosed that customer profile...more

Davis Wright Tremaine LLP

Litigation Preparedness Following a Data Breach: Three Tips to Consider During the Incident Response Period

Data breaches come in many different forms, sizes, and levels of complexity, but they tend to share certain key facts: A third-party bad actor—whether through a phishing attack, a ransomware attack, exploitation of a zero-day...more

Mitratech Holdings, Inc

Aligning your cyber risk management program with your company’s bottom line

The key to gaining buy-in for your cyber risk roadmap under tightening budgets and staffing challenges. This statement should come as no surprise: there’s been an alarming rise in the number and sophistication of cyber...more

Fox Rothschild LLP

The Impact of Recession on Cybersecurity Programs – Beware of the trap game.

Fox Rothschild LLP on

There’s no mistake, we’re in a recessionary cycle. We can stay out of the politics and debate related to predicting the exact cause, effect, size, and timeline of the recession. Debate or no debate, we’re already seeing...more

Wiley Rein LLP

Court Finds Business Interruption Coverage for Losses Resulting From Fraudulent Email Scheme

Wiley Rein LLP on

A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more

Fisher Phillips

Federal Authorities Warn Employers Against Ransomware Payouts and Offer New Guidance on Preventing and Responding to Cyberattacks

Fisher Phillips on

Federal officials have recently warned employers and businesses that they could have insult added to injury if they respond to cyberattacks by making ransomware payments – increasingly requested through cryptocurrency – as...more

Society of Corporate Compliance and Ethics...

Jenny Radcliffe on People Hacking

Liverpool-based Jenny Radcliffe, who leads Human Factor Security, is not your typical hacker, clad in a black hoodie and working out of basement. Rather than spending her time hunched over a keyboard, she seeks to hack...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 20, Number 9. Privacy Briefs: September 2020

- Utah Pathology Services, based in Salt Lake City, has reported a data breach involving approximately 112,000 patients. According to the medical practice’s “Notice of Data Incident,” the practice learned June 30 that “an...more

Sheppard Mullin Richter & Hampton LLP

SEC Issues $1 Million Identity Theft Rule Fine

The Securities and Exchange Commission recently settled with Voya Financial Advisors, Inc. for alleged violation of Regulation S-ID (otherwise known as the Identity Theft Red Flags Rule) and Regulation S-P (otherwise known as...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide