News & Analysis as of

Data Breach Cloud Storage

Ankura

Cybercriminals Are Moving into the Cloud and Making Your Active Directory Their New Home

Ankura on

Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more

Fisher Phillips

Ransomware Costs Businesses Record-High $1 Billion in 2023: Your 5-Step Plan to Prevent Attacks in 2024

Fisher Phillips on

2023 was the most devastating year yet for ransomware attacks, with businesses forking over $1 billion in ransom payments for the first time ever – and 2024 is expected to be even worse. Beyond the payments, the average cost...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

Rothwell, Figg, Ernst & Manbeck, P.C.

FTC Actions Hold Data Privacy Lessons For 2023

The Federal Trade Commission will have its eye on privacy and data security enforcement in 2023. In August, the agency announced that it is exploring ways to crack down on lax data security practices. In the announcement,...more

The Volkov Law Group

Regulatory Implications from 2019 Capital One Hack and Recent Conviction of Former AWS Engineer

The Volkov Law Group on

Paige Thompson, a former Amazon Web Services employee, was recently convicted of seven counts of fraud in U.S. District Court for stealing personal data from more than 100 million customers from unsecured accounts stored on...more

Robinson+Cole Data Privacy + Security Insider

Cloaked Ursa Using Trusted Online Storage Services to Evade Detection

According to research by Palo Alto’s Unit 42, the most recent campaign by advanced persistent threat Cloaked Ursa (aka APT 20, Nobelium, or Cozy Bear), “demonstrate[s] sophistication and the ability to rapidly integrate...more

Patterson Belknap Webb & Tyler LLP

Wegmans, New York Attorney General Enter Settlement to Resolve Data Security Investigation

In a sign that it may be stepping up enforcement of New York’s Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”), the New York Attorney General’s Office (“NYAG”) announced on June 30, 2022 that it had reached...more

Cozen O'Connor

AG James Recovers $400,000 From Wegmans Over Alleged Data Security Lapses

Cozen O'Connor on

New York AG Letitia James reached a $400,000 settlement with grocery store chain Wegmans Food Markets, Inc. to resolve allegations that the personal information of more than three million consumers nationwide was exposed,...more

Moore & Van Allen PLLC

Capital One Reaches $190 Million Settlement In Connection with 2019 Data Breach

Moore & Van Allen PLLC on

The saga of the Capital One data breach, which impacted an estimated 106 million individuals in the U.S. and Canada, may soon be coming to an end. After more than two years of litigation, the parties have reached a settlement...more

Mitratech Holdings, Inc

What Is Shadow IT? Know the Basics!

As defined by Gartner, Shadow IT refers to IT devices, software and services outside the ownership or control of information technology (IT) organizations. These are any IT projects that are managed outside of – and...more

Epiq

Episode 7: Top three things that will mitigate the most common types of cloud breaches (with John Grange)

Epiq on

Jerich Beason is joined by John Grange, who the co-founder and chief technology officer at OpsCompass which is a SaaS product that provides continuous, cloud-native governance and security in Azure, AWS, GCP, and Microsoft...more

Levenfeld Pearlstein, LLC

How To Better Protect Your Business From Cyberattacks

Bloomberg Law recently reported that Goodwin Procter was the latest law firm to fall victim to a data breach after one of its vendors was hacked. Cyberattacks on law firms and businesses have become increasingly common over...more

Reveal

How to Maintain CCPA Compliance in the Cloud

Reveal on

As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #243 – Misconfigured Cloud Exposes Millions of Records of Eleven Dating Sites

Dating sites continue to be the source of compromise of sensitive personal information. Another example of this was discovered recently by security researchers at WizCase, who found that information on millions of users of up...more

Robinson+Cole Data Privacy + Security Insider

30,000 Cannabis Users’ Data Exposed

A point of sale vendor for at least three cannabis dispensaries in the United States exposed the personal data of at least 30,000 cannabis users, including full names, photo IDs, dates of birth, telephone numbers, home...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - May 2019

In this month's edition of our Privacy & Cybersecurity Update, we examine expanded data breach notification laws in New Jersey and Washington state, as well as the SEC's risk alert regarding cloud-based storage solutions. We...more

The Volkov Law Group

It is 2019 . . . Do You Know Where Your Data Is?

The Volkov Law Group on

We are living in a rapidly changing world (trite, I know) where companies have to focus on data privacy and security for a variety of reasons. Consumers and constituents are concerned about the safety and privacy of personal...more

Mintz - Privacy & Cybersecurity Viewpoints

Failure to Signal: Uber Forced to Accept Expanded Settlement after Concealing Security Breach from FTC

Uber Technologies, Inc. (“Uber”) has agreed to an expansion of its initial August 2017 proposed consent agreement with the Federal Trade Commission (“FTC”), in light of revelations of an additional security breach in October...more

Harris Beach Murtha PLLC

Uber Goes 0-2 in Data Breach Notifications

In August, 2017, the Federal Trade Commission (“FTC”) proposed a settlement agreement with Uber stemming from its investigation of a 2014 data breach due to Uber’s “unreasonable security practices”. The lengthy investigation...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2018 #5

Robinson & Cole LLP on

Power Company Fined for Contractor Copying Data to its Own Insecure Network - Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more

Alston & Bird

The Digital Download - Alston & Bird’s Privacy & Data Security Newsletter - March 2018

Alston & Bird on

Features - Updates on the EU - Privacy & Data Security Team Launches GDPR Tracker Website. The Alston & Bird Privacy & Data Security Team recently launched the General Data Protection Regulation (GDPR) Tracker website,...more

McAfee & Taft

Selecting EHR Vendors: An ounce of prevention is worth a pound of cure

McAfee & Taft on

Management of electronic health records (EHR) is a complicated yet necessary task in the modern practice of medicine. To reduce the administrative burden of managing EHR records, many physicians and other healthcare...more

Poyner Spruill LLP

Lessons from the Equifax Breach

Poyner Spruill LLP on

As data breaches go, they don’t get much bigger than this. On Thursday, September 7, credit reporting giant, Equifax, reported that it had suffered a cyber-incident. 143 million consumer records, including names, birth dates,...more

Stinson LLP

HHS Publishes New Guidance on HIPAA and Cloud Computing

Stinson LLP on

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has issued a new guidance regarding HIPAA compliance and the use of cloud computing solutions. The guidance is intended to assist covered entities...more

WilmerHale

In Case You Missed It: Launch Links - July, 2016 #2

WilmerHale on

Some interesting links we found across the web this week: Why You Don’t Need to Found Your Startup in Silicon Valley - Startups have the potential to thrive in places less "trendy" than California....more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide