News & Analysis as of

Cyber Insurance Phishing Scams Data Security

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Butler Snow LLP

Cybersecurity: What Businesses Need to Know

Butler Snow LLP on

Cybersecurity is a top concern for all industries, particularly for the pharmaceutical and medical device industries. These industries hold some of the most sensitive data and highly valuable technology, making them prime...more

Woodruff Sawyer

Cyber Insurance Requirements: The Next Frontier

Woodruff Sawyer on

Cyber insurance buyers can expect stricter underwriting standards in the face of evolving cyberattacks. Cybercriminals are bypassing existing layers of security using advanced tactics and continuously adapting their...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Health Care Compliance Association (HCCA)

Compliance Refresher: Get Cozy With IT Folks, Review Insurance, Fine-Tune Policies, Training

Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more

Womble Bond Dickinson

Hacking Is Changing: Should Our Data Security Change?

Womble Bond Dickinson on

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Society of Corporate Compliance and Ethics...

Debra Geroux and Scott Wrobel on Responding to Data Breaches

When a data breach occurs, one step is often overlooked in the rush to remediate: preserving as much of the data logs and backups as possible That’s a mistake, say Debra Geroux, Shareholder at Butzel Long and Scott Wrobel,...more

Baker Donelson

Protecting LTC Residents' PHI: Eight Tips for Avoiding a Data Breach

Baker Donelson on

Organizations that meet the definition of "covered entity" under the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations (HIPAA) must be diligent to maintain the privacy and security...more

Sheppard Mullin Richter & Hampton LLP

FTC Cyber Guidance for Small Business has Tips Helpful to All

The Federal Trade Commission recently issued a cyber guide that, while intended for small businesses, can be of help for all businesses. The purpose of the guide, which includes various modules, is to help smaller businesses...more

Troutman Pepper

New Case May Signal Greater Likelihood That Insurers Are on the Hook for Coverage in Phishing Attacks

Troutman Pepper on

A new Sixth Circuit decision may signal an emerging trend on whether insurers must cover claims made by policyholders who fall victim to phishing scams....more

Steptoe & Johnson PLLC

Use This Checklist to Assess Your Cybersecurity Preparedness

Steptoe & Johnson PLLC on

When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more

Perkins Coie

Give Your Customers the Gift of Security

Perkins Coie on

2017 has reminded us that data security threats continue to evolve and that the stakes for companies can be very high if their data security programs fail to evolve as well. Before the recent announcement of Equifax’s...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - March 2016

In this edition of our Privacy & Cybersecurity Update, we examine the FCC's proposed privacy rules for broadband providers; new developments relating to the Privacy Shield, which was created to replace the U.S.-EU Safe Harbor...more

Carlton Fields

Phishing for Cybersecurity Coverage: When is a Fraud a “Computer Fraud”?

Carlton Fields on

In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide