News & Analysis as of

Passwords Data Protection Risk Management

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #430 – GrubHub Confirms Security Incident Through Third Party Vendor

If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #405 – Compromised Passwords Continue to Provide Easy Opportunities for Threat Actors

Verizon’s 2024 Data Breach Report, a must-read publication, was published on May 1, 2024. The report indicates that “Over the past 10 years, the use of stolen credentials has appeared in almost one-third (31%) of all...more

Foley Hoag LLP - Security, Privacy and the...

Your Password Can’t Possibly Be This Bad, Can It?

NordPass (the purveyor of a password manager) has assembled a list of the top 20 passwords in healthcare, based on usage by the world’s largest companies.  According to NordPass’s analysis, the “top” 20 passwords are: -...more

Bradley Arant Boult Cummings LLP

Cybersecurity Awareness Month: A Basic Primer to Keep Your Data & Information Safe

As Cybersecurity Awareness Month comes to an end and the spooky season of Halloween is upon us, no one wants to live through a cybersecurity horror story. There are some simple precautions every business and household can...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

Baker Donelson

I Can Hear Your Passwords

Baker Donelson on

On August 3, British researchers published an Institute of Electrical and Electronics Engineers (IEEE) article explaining how the sounds of typing on a laptop keyboard can be heard and that deep learning can be used to...more

Foley Hoag LLP - Security, Privacy and the...

If Your Password Is On This List, It’s Time to Change It

It’s been several years since I have written about password hygeine. I have been hoping that a better security solution would be widely adopted and while I hear rumors in that regard, passwords still reign supreme. So when I...more

Baker Donelson

The LastPass Lesson: Why Your Company Needs to Care About Password Manager Breaches

Baker Donelson on

In August 2022, LastPass – one of the largest password managers in the world – suffered a cyber breach resulting in the theft of thousands of password vaults of both individual and corporate users. Password managers are an...more

Robinson+Cole Data Privacy + Security Insider

LastPass Updates Disclosure of Security Incident

There are pros and cons to using a password manager. The biggest pro is that it is difficult to keep all of our passwords organized and safe. The biggest con is that if the password manager is compromised, and the master...more

Woods Rogers

Why You Need MFA Setup For Your Business

Woods Rogers on

Creating passwords needs to be a challenge, not for you to remember but for others to guess. Yet, the digital world is changing. A single sign-on password is pretty easy for unsavory characters to hack. Statistics indicate in...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Robinson+Cole Data Privacy + Security Insider

Passwords Used by Iranian-Backed Hackers Against Defense Contractors

When you are educating your employees about the importance of maintaining a complex password or passphrase, share this story to show why it is so important and to emphasize not to use same or similar passphrases across...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #301 – Can Your Co-Worker Guess Your Password? Probably!

We talk about passwords a lot. As you know, I am a fan of passphrases instead of passwords as they are hard to guess and easy to remember—a perfect combination for security data....more

Robinson+Cole Data Privacy + Security Insider

Tune Up Processes Around Passwords and Access Controls

A new report from Beyond Identity focuses on old, but very important issues—ending  access rights to network systems by terminated employees and the rampant sharing of passwords....more

Bass, Berry & Sims PLC

Privacy Perils: Trial Separation

Bass, Berry & Sims PLC on

For those with school age children, working from home now also means learning from home. In addition to your personal web surfing and emailing, separate your kids’ online school activities from a work-issued laptop and...more

Goodwin

Practical Steps to Reduce Cybersecurity Risks During COVID-19

Goodwin on

Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more

Society of Corporate Compliance and Ethics...

Compliance Perspectives: Cybervigilance and Cyber-resiliency

Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly. Recently he authored an article...more

K2 Integrity

Cybersecurity Awareness Month may be over – but threats are year round

K2 Integrity on

Cybersecurity Awareness Month may have ended on October 31, but cyber criminals are active 365 days a year, and they’re online looking for vulnerabilities around the clock. Every day, we also spend time online: navigating the...more

Hinshaw & Culbertson LLP

What a Famous Hip Hop Artist Can Teach About Cyber Security

Hinshaw & Culbertson LLP on

Risk Management Question: The title of this Alert is not merely click bait; it’s a real life lesson about cyber security risks and how not to handle them. The fact that it involves a famous hip-hop artist should hopefully get...more

Robinson+Cole Data Privacy + Security Insider

UK Information Commissioner’s Office Issues Guidance on Use of Encryption and Passwords in Connection with GDPR

The “security principle” under the General Data Protection Regulation (GDPR) requires that organizations process personal data securely by means of “appropriate” technical and organizational measures....more

Mitchell, Williams, Selig, Gates & Woodyard,...

Passwords Are Getting Ridiculous, Right? Consider Simplifying Your Company's Two-Factor Authentication With A Physical Security...

If you clicked on this post, that means you probably fall into one of two categories. Category 1: You are really tired of having to come up with – and remember – increasingly more complicated passwords, only to then be asked...more

Payne & Fears

Don’t Let Technology Run Away With Your Customer Information

Payne & Fears on

For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more

Seyfarth Shaw LLP

Biometrics & Blockchain in the Workplace: A Primer

Seyfarth Shaw LLP on

Information is everywhere, especially in the workplace. But traditional means of securing and sharing data—which typically involve accessing password protected information from various sources—is inefficient, cumbersome, and...more

Chambliss, Bahner & Stophel, P.C.

Cybersecurity 101 for Startups

Every business, including startups, has data to protect. So, it’s not really a matter of if, but when an organization will experience cyber and data privacy threats. This post will provide tips on how to proactively protect...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide