News & Analysis as of

Cyber Crimes Phishing Scams Data Privacy

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Sunstein LLP

Phishing Attacks: The FTC Steps Up Its Standards

Sunstein LLP on

Phishing schemes encompass fraudulent emails, text messages, phone calls, or web sites designed to manipulate people into downloading malware, sharing sensitive information, or otherwise exposing themselves or their...more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 3. Privacy Briefs: March 2022

Report on Patient Privacy 22, no. 3 (March, 2022) - HHS said in early March that it was not aware of any specific threat to U.S. health care organizations stemming from the Russian invasion of Ukraine. “However, in the...more

Clark Hill PLC

October Is National Cybersecurity Awareness Month – Be Cyber Alert and Guard Against Phishing

Clark Hill PLC on

This month is the 18th Annual National Cybersecurity Awareness Month in the United States, sponsored by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance. This year’s theme...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #290 – 700 Million LinkedIn Users’ Data for Sale on Hacker Forum

Although a security researcher has confirmed that LinkedIn users’ data, including full names, gender, email addresses, telephone numbers, and industry information is for sale on RaidForums by a hacker self-dubbed “GOD User...more

Shumaker, Loop & Kendrick, LLP

Client Alert: The Risk from Phishing

We are all well aware of the risks that cyber-crime presents to businesses now. On a weekly basis, we see stories about virus attacks, hacks, and ransomware. But, how do we avoid being the victim?...more

Carlton Fields

No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars

Carlton Fields on

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Society of Corporate Compliance and Ethics...

[Virtual Event] 2021 Alaska Regional Compliance & Ethics Conference - February 26th, 8:25 am - 4:30 pm AKST

Our Virtual Regional Compliance Conferences provide updates on the latest news in regulatory requirements, compliance enforcement, and strategies to develop effective compliance programs. Watch, listen, and ask questions from...more

Health Care Compliance Association (HCCA)

Security Threats Soar From Nation-State Bad Actors as the New Year Gets Underway

Report on Patient Privacy 18, no. 1 (January 2021) - Security threats to health care entities will continue to escalate in 2021, as bad actors with significant capabilities target pandemic-weary organizations still...more

Fisher Phillips

Financial Services Employers Face Significant Increase In Cybersecurity Threats

Fisher Phillips on

Employers in the financial services sector are facing an unprecedented number of cybersecurity attacks during the pandemic crisis. To put this in perspective, the Financial Industry Regulatory Authority (FINRA) has issued...more

Health Care Compliance Association (HCCA)

From Her Words to OCR's Ears: 'Dissent' Seeks to Hold Hackers, Leakers Accountable

Report on Patient Privacy 20, no. 11 (November 2020) - In her 14-plus years of investigating and blogging about hacking and breaches, “Dissent” has been yelled at, threatened with lawsuits and accused of being a criminal....more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2020

Robinson & Cole LLP on

CYBERSECURITY - FBI + CISA Issue Joint Alert on Vishing Attacks - When the Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) get together to issue an alert to warn us...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Epstein Becker & Green

Cyber Coverage in the Age of COVID-19 Need Not Result in Pandemonium

Epstein Becker & Green on

While businesses and their employees continue to operate in the “new frontier” of working-from-home during the COVID-19 pandemic and the gradual reopening of the economy, a serious risk continues to present itself: the threat...more

Blank Rome LLP

[Webinar] Primers for Pandemic Litigation Update - Critical Assets at Risk: Protecting Data Privacy and Trade Secrets during...

Blank Rome LLP on

With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more

Pillsbury Winthrop Shaw Pittman LLP

Technology is Not Immune to COVID-19 Cyber Fraud

Transitioning the American workforce to telework presents a heightened risk of cybercrime and new challenges for businesses to protect sensitive data. Mandatory “stay-at-home” orders have forced many businesses to rely on...more

Association of Certified E-Discovery...

Coronavirus Home Office Security – Practical Tips for Securing Your “New” Home Office

I’ve been working as an independent consultant for quite some time. Along the journey, I’ve picked up many tips and tricks to maximize productivity while working from home with great results. There have been many articles...more

Fisher Phillips

The Cybersecurity Threat of COVID-19

Fisher Phillips on

As people across the world react to the rapid spread of COVID-19, a new threat is emerging; individuals and employers face a risk from hackers trying to take advantage of the demand for information. Hackers have begun using...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #2

Robinson & Cole LLP on

Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more

Bass, Berry & Sims PLC

Privacy Perils: Black Friday Blues

Bass, Berry & Sims PLC on

With the holiday season fast-approaching, thrifty shoppers across the country will soon be looking to spend (and save) their hard-earned money during what is arguably the busiest shopping weekend of the year, spanning Black...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 4: Recognize Identity Theft

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - July 2019 #4

Robinson & Cole LLP on

Security research firm Gigamon has reported that the nasty cybercriminal group FIN8 may have reappeared in June after a two-year silence. FIN8 is known for implementing malware on point of sale systems to steal credit card...more

Foley Hoag LLP - Security, Privacy and the...

Minimizing Risk and Liability from Man in the Middle Attacks (or, How to Keep Your Company’s Wire Transfers from Going Awry)

Imagine this scenario: you’ve had a productive and mutually advantageous ongoing contractual relationship of several years with another party. You have built up quite a bit of trust over the years, and communicate regularly...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide