News & Analysis as of

Data Protection Passwords Today's Popular Updates

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Employee Cybersecurity Awareness Training

Jackson Lewis P.C. on

As Cybersecurity Awareness Month wraps up, it’s worth mentioning that employee security awareness training is an ongoing process. Employee error remains a significant contributing factor in data breaches. According to the...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication

K2 Integrity on

This article is the second in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity will be providing tips and solutions to organizations to commemorate the 20-year anniversary of the...more

Kohrman Jackson & Krantz LLP

Ten Ways You Can Protect Your Privacy on Social Media

Social Media connects people across the world by providing users with a means to share content. It has undoubtedly become a huge part of our daily routines. In 2021, Americans spent an average of two hours and thirty minutes...more

Davis Wright Tremaine LLP

NY Attorney General Settlement Highlights Challenges of Username and Password Breaches

October was a busy month in New York for cybersecurity enforcement. In addition to a $4.5 million settlement between the New York Department of Financial Services and EyeMed Vision Care (discussed in a forthcoming blog post),...more

Vinson & Elkins LLP

Here Comes the Fashion (Cybersecurity) Police: New York Attorney General Imposes Penalty for Mishandling of Consumer Data Breach

Vinson & Elkins LLP on

On October 12, 2022, New York Attorney General Letitia James fined Zoetop Business Company, Ltd. (“Zoetop”), the owner of fast-fashion brands SHEIN and ROMWE, $1.9 million for mishandling a 2018 data breach and lying to the...more

Venable LLP

[Webinar] CFPB Weighs in on Data Security; Will Firms with Poor Security Be in the Crosshairs? - October 14th, 1:00 pm - 2:00 pm...

Venable LLP on

In the late summer, the Consumer Financial Protection Bureau (CFPB) issued a circular that concluded in no uncertain terms that insufficient data protection or information security could be considered an unfair practice under...more

Robinson+Cole Data Privacy + Security Insider

Password Manager LastPass Admits to Hack

Password manager LastPass, reportedly used by more than 33 million users, recently announced that it was hacked, and although it reports that no passwords of users were compromised in the incident, unfortunately, its source...more

Carlton Fields

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

Carlton Fields on

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022

Robinson & Cole LLP on

CYBERSECURITY - CISA/FBI Advisory Warns of Destructive Malware Used Against Ukraine - The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory this week alerting organizations of...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2021 #2

Robinson & Cole LLP on

CYBERSECURITY - Apple + Microsoft Release Patches for Identified Vulnerabilities - This week, both Apple and Microsoft issued patches to fix serious zeroday vulnerabilities that should be applied as soon as possible. That...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2021 #3

Robinson & Cole LLP on

CYBERSECURITY - FBI, CISA + NSA Issue Conti Ransomware Advisory - On September 22, 2021, the Federal Bureau of Investigations (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security...more

Carlton Fields

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Carlton Fields on

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

PilieroMazza PLLC

[Webinar] Cybersecurity & Data Privacy Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small...

PilieroMazza PLLC on

With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more

Farrell Fritz, P.C.

The Invaluable Benefits Of Multi-Factor Authentication

Farrell Fritz, P.C. on

The need to input a username and password when logging into a computer is a “single factor” authentication. But, from a security perspective, that single factor authentication only goes so far. Consider, for example, the...more

Bass, Berry & Sims PLC

Privacy Peril: The Dog Ate My Password

Bass, Berry & Sims PLC on

We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more

Bass, Berry & Sims PLC

Privacy Perils: Password Quarantine Hygiene

Bass, Berry & Sims PLC on

Some have used the pandemic, and now the extended inclement weather, to learn to play a musical instrument, speak a new language or another new skill. If those are beyond any of your reasonable expectations, do not simply...more

Goodwin

Practical Steps to Reduce Cybersecurity Risks During COVID-19

Goodwin on

Cybercriminals love a crisis and COVID-19 is no different. In the last several weeks, cyber-crime has increased exponentially as hackers seek to take advantage of the migration to a remote workplace. As cybercriminals seek to...more

Association of Certified E-Discovery...

Coronavirus Home Office Security – Practical Tips for Securing Your “New” Home Office

I’ve been working as an independent consultant for quite some time. Along the journey, I’ve picked up many tips and tricks to maximize productivity while working from home with great results. There have been many articles...more

Bass, Berry & Sims PLC

Privacy Perils: Refresher Course in Good Password Hygiene, Part 1

Bass, Berry & Sims PLC on

To prepare for and in honor of National Change Your Password Day (NCYPD) on February 1, we are providing a refresher course in good password hygiene. (Look back at prior Privacy Perils.) NCYPD is only one of at least three...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2019 #2

Robinson & Cole LLP on

The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more

Thomas Fox - Compliance Evangelist

Life With GDPR: Episode 26- The Importance of Passwords

In this podcast, data privacy/data security expert Jonathan Armstrong and Compliance Evangelist Tom Fox use the framework of GDPR to discuss a wide range of issues relating to these topics. They consider what the US...more

48 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide