Protection of industrial control systems is crucial to the security of our country. The National Cybersecurity Center of Excellence (NCCoE) has announced a project for which it is seeking comment: Detecting and Protecting...more
6/17/2019
/ Amazon Marketplace ,
Capital Raising ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Drones ,
Enforcement Actions ,
Federal Aviation Administration (FAA) ,
Industrial Space ,
Initial Coin Offering (ICOs) ,
Manufacturing Facilities ,
Microsoft ,
Mobile Apps ,
National Security Agency (NSA) ,
Part 107 ,
Personal Data ,
Popular ,
Quest Diagnostics ,
Securities and Exchange Commission (SEC) ,
Securities Violations ,
Social Media ,
Unregistered Securities ,
Waivers ,
Wellness Programs
In a contentious move, the Securities and Exchange Commission (SEC) recently sued Kik Interactive Inc. for its Initial Coin Offering of $100 million, alleging it violated securities laws by not registering the offering with...more
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more
6/7/2019
/ California Consumer Privacy Act (CCPA) ,
China ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Exploitation ,
Extortion ,
FBI ,
Genetic Materials ,
Genetic Testing ,
Hackers ,
Information Technology ,
Malware ,
OIG ,
Online Safety for Children ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Quest Diagnostics ,
Vulnerable Victims
Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar....more
The North American Securities Administrators Association (NASAA) this week approved an information security model rule package aimed at improving the cybersecurity posture of the 17,543 state-registered advisers.
...more
5/24/2019
/ Contract Drafting ,
Cryptocurrency ,
Cybersecurity ,
Data Privacy ,
Electronic Protected Health Information (ePHI) ,
FinCEN ,
Hackers ,
Investment Adviser ,
Mobile Apps ,
Model Rules ,
Money Laundering ,
Money Services Business ,
NASAA ,
Phishing Scams ,
Popular ,
Securities Regulation ,
Virtual Currency ,
WhatsApp
According to a recent FBI Flash, Ryuk ransomware has hit more than 100 U.S. companies since August 2018, with a “disproportionate impact on logistics companies, technology companies, and small municipalities.”...more
5/20/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Management
Hotel chain Fillmore Hospitality, LLC is the latest target of a proposed class action complaint filed this week, alleging violation of the Illinois Biometric Information Privacy Act (BIPA). We don’t usually discuss the...more
5/13/2019
/ Biometric Information ,
Class Action ,
Contract Management ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Dating Services ,
Drones ,
Federal Aviation Administration (FAA) ,
HIPAA Breach ,
Mobile Apps ,
Organ Donation ,
Popular ,
Ransomware ,
Supply Chain ,
Unmanned Aircraft Systems ,
Vendors
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night....more
I attended a meeting of cybersecurity professionals recently and overheard several of them talking about their new security cameras and how great it is to see everyone who comes up the driveway and to the front door, and...more
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at...more
5/3/2019
/ Best Practices ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Limitation of Liability Clause ,
Phishing Scams ,
Popular ,
Unmanned Aircraft Systems
According to Hiscox’s Third Cyber Readiness Report, which surveyed 5,400 firms in the U.S. and the E.U., cyber threats have “become the unavoidable cost of doing business today.” The Report notes that for the first time, “a...more
4/29/2019
/ Charitable Donations ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Electronic Protected Health Information (ePHI) ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
OCR ,
Personally Identifiable Information ,
Popular ,
Scams ,
Vulnerability Assessments
I was with a bunch of CFOs this week talking about cybersecurity and I told them how easy it is for hackers these days. They can infiltrate a company’s system by compromising an O365 account that doesn’t have multi-factor...more
The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange...more
4/1/2019
/ Authentication ,
Connected Items ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
Popular ,
Ransomware ,
Smart Devices
The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago....more
Cities and towns continue to be a profitable target for successful ransomware attacks. As we previously reported, the list of cities and towns getting hit with ransomware attacks continues to grow....more
Cybersecurity company Carbon Black recently issued are port of the results of a survey of chief information security officers (CISOs) of financial organizations, which showed that the financial industry is getting hammered by...more
3/11/2019
/ Auto-Dialed Calls ,
Banking Sector ,
Contract Terms ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
GoDaddy.com ,
Identity Theft ,
Personally Identifiable Information ,
Popular ,
Tax Fraud ,
TCPA ,
Text Messages
In an effort to phase out what many in the security world believe are threats to the cybersecurity posture of governmental agencies and private entities alike...more
The HIPAA (Health Insurance Portability and Accountability Act) breach notification regulations require covered entities to self-report the unauthorized access, use or disclosure of unprotected protected health information...more
To illustrate just how creative phishing campaigns have become, on January 30, 2019, it was reported by multiple credit unions that Bank Secrecy Act officers at credit unions around the country received emails that appeared...more
2/18/2019
/ Artificial Intelligence ,
Banking Sector ,
BSA/AML ,
Criminal Investigations ,
Cybersecurity ,
Data Breach ,
DNA ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Institutions ,
Financial Services Industry ,
Genetic Materials ,
Genetic Testing ,
OCR ,
Phishing Scams ,
Popular ,
Regulatory Oversight ,
Regulatory Requirements ,
Settlement ,
TCPA ,
Unmanned Aircraft Systems
To illustrate just how creative phishing campaigns have become, on January 30, 2019, it was reported by multiple credit unions that Bank Secrecy Act officers at credit unions around the country received emails that appeared...more
I was a speaker at a recent conference of municipalities in a state last week, and during my presentation, I mentioned the various cyber-attacks that have affected cities, towns and educational departments in the U.S....more
Just before the new year, the Department of Health and Human Resources (HHS) released voluntary cybersecurity practices for health care organizations, which consists of a main document, two technical volumes, and resources...more
1/7/2019
/ Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Department of Health and Human Services (HHS) ,
Digital Assets ,
Digital Wallets ,
Dispensaries ,
Drones ,
Educational Institutions ,
Hackers ,
Harassment ,
Marijuana Related Businesses ,
Online Platforms ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Safety Inspections ,
Shell Oil ,
Title IX ,
Virtual Currency
New Year’s is a time to look back on the happenings of the year and focus on the lessons and reminders those events have provided. For our final newsletter of the year, we’d like to share with you our top 10 most read posts...more
12/31/2018
/ Banking Sector ,
Blockchain ,
Connected Items ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Conduct Authority (FCA) ,
Hackers ,
Initial Coin Offering (ICOs) ,
Investment Opportunities ,
Personally Identifiable Information ,
Popular ,
Wells Fargo
Experian’s Data Breach Resolution group has released its Data Breach Industry Forecast 2019 Report, which provides predictions for data breaches in 2019, and outlines staggering statistics of data breaches that occurred in...more
12/20/2018
/ Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Experian ,
Financial Services Industry ,
Hackers ,
Popular ,
Risk Management ,
Vulnerability Assessments
Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
12/10/2018
/ Authentication ,
Cybersecurity ,
Dark Web ,
Data Breach ,
Data Privacy ,
Drones ,
GPS ,
Hackers ,
Law Enforcement ,
Marriott ,
Personally Identifiable Information ,
Popular ,
Putative Class Actions ,
Recruitment Incentives ,
State and Local Government ,
Unmanned Aircraft Systems ,
USPS ,
Vulnerability Assessments