Cyber-Attacks Against Maritime Industry Quadrupled in Last Few Months -
A recent report released by the British Ports Association and Astaara, a risk management firm based in the U.K., concludes that since February of 2020,...more
6/28/2020
/ California Consumer Privacy Act (CCPA) ,
Contact Tracing ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Maritime Transport ,
Mobile Apps ,
Personally Identifiable Information ,
Popular
Alabama City Hit with Ransomware -
On June 5, 2020, Florence, Alabama’s information technology systems were hit with ransomware by the DoppelPaymer group demanding a ransom payment of $378,000 in bitcoin. Mayor Steve Holt...more
6/13/2020
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Department of Homeland Security (DHS) ,
Hackers ,
Marketing ,
Microsoft ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Robocalling ,
Vulnerability Assessments
Capital One Required to Produce Forensic Report in Class Action -
As a litigator, when responding to any security incident, thoughtful consideration is given to the possibility that the security incident may wind up in...more
5/31/2020
/ Artificial Intelligence ,
Automation Systems ,
Capital One ,
Class Action ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Breach ,
Data Privacy ,
Department of Defense (DOD) ,
Drones ,
Financial Services Industry ,
iPhone ,
Popular ,
Robotics ,
Toyota ,
Vulnerability Assessments
As a litigator, when responding to any security incident, thoughtful consideration is given to the possibility that the security incident may wind up in litigation, and therefore, certain decisions are made in anticipation of...more
After incidents of Zoom “bombing,” including a recent intrusion by hackers to disrupt a church service with foul content (don’t these guys have better things to do?), it has been reported that hackers are now taking advantage...more
Cognizant Confirms Maze Ransomware Attack -
The criminals behind the Maze ransomware [view recent related posts here and here] have gone big and hit Cognizant, one of the largest technology consulting companies in the U.S.,...more
4/25/2020
/ Coronavirus/COVID-19 ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Drones ,
Fast-Food Industry ,
Loss Prevention ,
National Security ,
NYDFS ,
Personal Data ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Ransomware ,
U.S. Navy
Google has warned users in a blog article that nation state-backed hackers are using the COVID-19 crisis to ramp up phishing attempts and, in one example, are posing as American fast food franchises and sending malicious...more
I always enjoy hosting and participating in the CISO Executive Network meetings. The meetings offer Chief Information Security Officers (CISOs) the opportunity to discuss together ways they can improve security in their...more
Sodinokibi Hackers Switch Payment Mechanism to Monero -
The hackers behind the Sodinokibi/REvil ransomware have reportedly switched their demands for payment from Bitcoin or Ethereum to Monero cryptocurrency to try to...more
4/19/2020
/ Bitcoin ,
CARES Act ,
Coronavirus/COVID-19 ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Security ,
Financial Stimulus ,
Hackers ,
INTERPOL ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Mitigation ,
Scams
Interpol has issued an alert to global law enforcement agencies about the increased risk of ransomware attacks on hospitals, health care providers and other organizations on the front line of response to the COVID-19...more
4/18/2020
/ Coronavirus/COVID-19 ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Protection ,
Data Security ,
Electronic Protected Health Information (ePHI) ,
Hackers ,
Health Care Providers ,
Hospitals ,
INTERPOL ,
Popular ,
Ransomware
The hackers behind the Sodinokibi/REvil ransomware have reportedly switched their demands for payment from Bitcoin or Ethereum to Monero cryptocurrency to try to prevent law enforcement from tracking payments....more
The transition from work-from-the-office to work-from-home has been rapid during the pandemic. All of a sudden, millions of workers are working from home, while data security personnel were not able to plan and operationalize...more
Microsoft Issues Cybersecurity Risk Warning and Offers Help to Hospitals During COVID-19 Crisis -
On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk...more
4/6/2020
/ Coronavirus/COVID-19 ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Microsoft ,
OCR ,
Popular ,
Telemarketing ,
Vulnerability Assessments
Despite the fact that the hackers behind Maze ransomware previously promised not to hit medical organizations during the coronavirus pandemic, it recently attacked a British medical lab that is slated to test COVID-19...more
Natural Gas Compressor Facility Shut Down After Ransomware Attack -
The Department of Homeland Security (DHS) announced this week that a ransomware attack shut down a natural gas compressor facility for two days. While in...more
2/25/2020
/ Bitcoin ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Emergency Response ,
Extortion ,
Hackers ,
OCR ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Settlement Negotiations ,
TCPA
There’s nothing worse than paying criminals. And paying a ransom for data is just that—paying criminals for a criminal act. All you get out of the payment is access to your data....more
The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more
2/11/2020
/ Confidential Information ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Employee Misconduct ,
Information Sharing ,
Internal Controls ,
Negligence ,
Popular ,
Risk Management ,
Threat Management ,
Vulnerability Assessments
The National Institute of Standards and Technology (NIST) released its first privacy framework tool (the “Privacy Framework”) on January 16, 2020. In the Executive Summary...more
1/23/2020
/ Consumer Privacy Rights ,
Cybersecurity ,
Cybersecurity Framework ,
Data Privacy ,
Data Protection ,
Data Security ,
Framework Agreement ,
NIST ,
Personal Data ,
Popular ,
Risk Management
The Federal Bureau of Investigation (FBI) is warning of a heightened likelihood of Iranian cyber-attacks following the escalation of tension between the U.S. and Iran. This follows the warning last week by the Department of...more
1/17/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
FBI ,
Hackers ,
Information Management ,
Infrastructure ,
Iran ,
Phishing Scams ,
Popular ,
Retaliation ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
The Department of Homeland Security (DHS) issued a grave warning to U.S. businesses and critical infrastructure operators on January 6, 2020 alerting the public that Iran poses a cyber terrorism threat to the United States...more
1/9/2020
/ Assassinations ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Hackers ,
Iran ,
Popular ,
Risk Management ,
Risk Mitigation ,
Terrorist Threats ,
Vulnerability Assessments
After much anticipation and trepidation, the California Consumer Privacy Act (CCPA) went into effect on January 1, 2020. Many companies are understandably still grappling with the details of the law, the amendments, and the...more
1/3/2020
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Deletion ,
Data Management ,
Data Privacy ,
Data Protection ,
Information Governance ,
Opt-In ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Privacy Laws ,
Right to Delete ,
Rulemaking Process ,
State and Local Government
Approximately 3,000 customers of the Fort Worth Water Department were notified recently that their credit card information may have been compromised as a result of a data breach suffered by its vendor, Click2Gov....more
12/12/2019
/ Credit Cards ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Debit and Credit Card Transactions ,
Hackers ,
Infrastructure ,
Mobile Payments ,
Municipalities ,
Personally Identifiable Information ,
Popular ,
State and Local Government
National Veterinary Associates (NVA), a large network of veterinary hospitals and clinics, has reportedly been the victim of a ransomware attack. According to the reports, NVA employs more than 2,600 veterinarians, with over...more
12/11/2019
/ Aviation Industry ,
Beneficiaries ,
Biometric Information ,
Bitcoin ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Medicare ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Restaurant Industry ,
Settlement Agreements ,
Virtual Currency
The Office for Civil Rights (OCR) announced that it has fined the Texas Health and Human Services Commission (TXHHS) $1.6 million for HIPAA violations. This is one of the few fines the OCR has levied against a state agency....more
11/22/2019
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Electronic Medical Records ,
Enforcement Actions ,
Fines ,
Hackers ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
OCR ,
PHI ,
Popular
Microsoft announced this week that it would extend the consumer rights currently given to California consumers through the California Consumer Privacy Act to all consumers—no matter where they reside....more
11/15/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Microsoft ,
Personal Data ,
Personally Identifiable Information ,
Policy Statement ,
Popular ,
Privacy Laws ,
Privacy Policy