News & Analysis as of

Confidential Information Cybersecurity Cyber Attacks

Health Care Compliance Association (HCCA)

Privacy Briefs: August 2024

On July 19, Change Healthcare Ince. filed a breach report with HHS Office for Civil Rights (OCR) concerning its mammoth ransomware attack and breach. The organization’s breach report to OCR identifies just 500 individuals as...more

Spilman Thomas & Battle, PLLC

HHS Cybersecurity Performance Goals and the Healthcare Industry

The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more

Jackson Lewis P.C.

Dealing With the Growing Threat of Cyberattacks in Manufacturing Sector: What Employers Need to Know

Jackson Lewis P.C. on

For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Spilman Thomas & Battle, PLLC

Protecting Employees' Private Health Information from a Cyberattack in the Age of COVID-19

With COVID-19, employers are receiving and processing an ever-increasing amount of their employees' confidential health information. From COVID-19 test results to vaccination status, many employers are routinely collecting...more

Farrell Fritz, P.C.

The Invaluable Benefits Of Multi-Factor Authentication

Farrell Fritz, P.C. on

The need to input a username and password when logging into a computer is a “single factor” authentication. But, from a security perspective, that single factor authentication only goes so far. Consider, for example, the...more

Sheppard Mullin Richter & Hampton LLP

NYDFS Issues Ransomware Guidance

The New York State Department of Financial Services recently announced new guidance addressing ransomware attacks, and highlighting cybersecurity measures to significantly reduce the risk of an attack. The guidance comes as...more

Fisher Phillips

New Federal Tools Can Help Private Sector Protect Trade Secrets From Cyberattacks – And May Soon Require Reporting

Fisher Phillips on

Cybersecurity was undoubtably on the forefront of the agenda for many organizations in 2020 – and 2021 should be no different. The rapid shift to remote work over the past year has led to an increased number of cybersecurity...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

Baker Donelson

Data Privacy Day: Top Considerations for 2021

Baker Donelson on

Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more

Fisher Phillips

Not If But When: Cybercrime Targets Telework

Fisher Phillips on

As a result of the COVID-19 pandemic, millions of Americans have deserted the physical workplace. Modern technology and remote access capabilities have made it possible to transform almost any job to a telework position. As...more

Robinson+Cole Data Privacy + Security Insider

Frequency and Cost of Insider Threats Continue to Increase

The Ponemon Institute recently issued its 2020 Cost of insider Threats Global Report, which finds that the frequency and cost of insider threats is continued to increase. Sponsored by ObserveIT and IBM, the 2020 report is the...more

Bass, Berry & Sims PLC

Privacy Perils: Ignorance is Not Bliss

Bass, Berry & Sims PLC on

After several years of cyberattacks, you may be lulled into thinking large, sophisticated companies have now employed adequate safeguards to prevent disclosure of your confidential information. Don’t be so sure. Earlier this...more

Polsinelli

HIPAA-Covered Entities: It’s Time to Cover Yourself - Are you prepared for Colorado’s new data breach law to take effect?

Polsinelli on

On May 29, 2018, Colorado Governor John Hickenlooper signed changes to Colorado law that significantly increase potential data breach burdens and financial penalties on entities operating in Colorado.1 Beginning September 1,...more

Fisher Phillips

Cyber Insurance: Get What You Pay For              

Fisher Phillips on

Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more

Troutman Pepper

The Risks and Implications of Failing to Comply with U.S. Government Cyber and IT Requirements

Troutman Pepper on

This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Robinson+Cole Data Privacy + Security Insider

SEC brings first cybersecurity-related enforcement action

The Securities and Exchange Commission (“SEC”) recently settled its first cybersecurity-related enforcement action against a Missouri based registered investment adviser, R.T. Jones Capital Equities Management, Inc. (the ...more

Carlton Fields

Investment Adviser Settles SEC Charges After Data Breach

Carlton Fields on

Last week, the Securities and Exchange Commission (SEC) settled charges against a registered investment adviser for failing to comply with Rule 30(a) of Regulation S-P (17 C.F.R. § 248.30(a)) (“Safeguards Rule”). The...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

King & Spalding

California’s Governor Strengthens Cybersecurity Preparedness With Executive Order

King & Spalding on

On August 31, 2015, California Governor Edmund G. Brown Jr. signed Executive Order B-34-15. The Order directs the Governor’s Office of Emergency Services to establish the California Cybersecurity Integration Center...more

Orrick - Trade Secrets Group

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Butler Snow LLP

Cheatin’ Ain’t Easy: Potential Theories of Liability Emerge for Online Cheating Website Ashley Madison

Butler Snow LLP on

Ashley Madison, a dating website specifically geared towards married individuals looking to have an affair, recently found out it was the victim of cyber hackers who claim to have stolen personal information, including names...more

Locke Lord LLP

Privacy & Cybersecurity Newsletter: International Edition July 2015

Locke Lord LLP on

Retail Tracking Update: Privacy Guidance Following Nomi Technologies - There is currently a widespread effort to quantify everything, from steps, to sleep, to batted ball exit velocity. Fifteen years ago, TV host Jeremy...more

Orrick - Trade Secrets Group

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

26 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide