Latest Posts › Popular

Share:

Recommended Practices to Detect Unauthorized Access on Company Networks

The cyber threat landscape is continually evolving. Cybercriminals are using new and sophisticated methods to gain unauthorized access to networks and steal sensitive information. Cybercriminals often remain hidden on a...more

FSSCC Launches Cybersecurity Profile v1.0

A coalition of industry groups has unveiled a new cyber compliance profile framework specifically for financial institutions, aimed at streamlining regulatory burdens....more

Data Breach Obligations, Preparation and Risk Mitigation

The Four Key Elements of Breach Determination - Under the Health Insurance Portability and Accountability Act (HIPAA), a breach is defined as “the acquisition, access, use or disclosure of protected health information in a...more

Ransomware Attacks in Healthcare: Preparing and Protecting Your Organization

Editor’s Note: Cybercrime Magazine predicts that global ransomware attacks will reach $11.5 billion in 2019 and that ransomware attacks will hit a business every 14 seconds by next year, with a new report revealing that 45%...more

Ransomware Attacks in Healthcare: Nine Key Questions Answered

Editor’s Note: At a recent webinar, Manatt revealed how healthcare organizations can prepare and protect themselves from the devastation of a ransomware attack. (See next article for more information on the webinar.) We had...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide