“Through December 20, 2024, 575 security incidents involving unsecured protected health information affecting 500 or more individuals had been reported to Health and Human Services. Through the same date in 2023, 265...more
In a recent letter to insurers, the New York State Department of Financial Services (“NYDFS”) acknowledged the key role cyber insurance plays in managing and reducing cyber risk – while also warning insurers that they could...more
Digital transformation, the process of leveraging technology, people and processes to innovate, requires an “all-in, ongoing commitment to improvement.” But the main drivers of digital transformation – data and profits –...more
Digital transformation refers to the process of leveraging technology, people and processes to innovate or stay competitive. The main driver of this process is often data...more
As businesses institute widespread remote work policies and procedures to facilitate social distancing and “flatten the curve,” they should be mindful of increased data privacy and security risks. The risks can range from...more
3/22/2020
/ Chief Information Officers (CIO) ,
Chief Information Security Officer (CISO) ,
Coronavirus/COVID-19 ,
Cybersecurity ,
Data Protection ,
Data Transfers ,
Multi-Factor Authentication ,
Phishing Scams ,
Popular ,
Remote Working ,
Risk Management ,
Telecommuting
Scammers are always seeking new ways to target victims for Business Email Compromise (BEC) scams, where they leverage email to try to convince you to give them credentials, send them confidential information like W2s, send...more
11/12/2019
/ Business E-Mail Compromise (BEC) ,
Construction Industry ,
Contractors ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Popular ,
Ransomware ,
Subcontractors