News & Analysis as of

Multi-Factor Authentication Cybersecurity Cyber Attacks

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Jackson Lewis P.C.

Multi-factor Authentication (MFA) Bypassed to Permit Data Breach

Jackson Lewis P.C. on

As organizations continue to take steps to prevent cyberattacks, a near-universal recommendation is that they should implement multi-factor authentication (MFA), and for good reason. Organizations subject to the updated FTC...more

Fisher Phillips

Deepfake Scammers Steal $25 Million From Company: 5 Ways You Can Avoid Being Victim to Latest AI Nightmare

Fisher Phillips on

A group of scammers recently used deepfake technology – now readily available to just about anyone – to trick a finance employee into paying them over $25 million of corporate funds. This might be one of the world’s biggest...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #388 – Understanding the Risk of Multifactor Authentication Fatigue

Most organizations and online platforms use multifactor authentication (MFA) (also called two-factor authentication) to confirm that the user is an authorized individual and not a scammer or fraudster. We have all been...more

Health Care Compliance Association (HCCA)

Privacy Briefs: February 2024

The American Hospital Association (AHA) has warned that information technology (IT) help desks are being targeted in a social engineering scheme that uses the stolen identity of revenue cycle employees or employees in other...more

Proskauer - Health Care Law Brief

Cybersecurity a Top Priority – HHS Publishes New Cybersecurity Performance Goals

The U.S. Department of Health and Human Services (“HHS”) has expanded upon its recent Healthcare Sector Cybersecurity Concept Paper (which we covered in a prior blog post), issuing cybersecurity performance goals (“CPGs”) for...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Cozen O'Connor

New York May Be Paving the Way for State-level Cybersecurity Regulations on Health Care Facilities

Cozen O'Connor on

Last month, a cyberattack forced two New York hospitals to divert and even discharge some patients to other facilities, while the affected hospitals shut down their IT systems to address the issue and restore their secure...more

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Cybersecurity is Important for Small Business Too.

Jackson Lewis P.C. on

Small businesses may be discouraged from investing in preventive cybersecurity measures due to the expense involved and the mistaken belief that only larger companies are the target of cybercrimes. But that is not the case....more

Amundsen Davis LLC

Is Nothing Sacred? Cyberattacks May Impact Director and Officer Fiduciary Duties

Amundsen Davis LLC on

MGM Resorts is the latest victim of a cyberattack occurring on September 10th, which has set back the gambling and leisure giant substantially, both in terms of business function and income. MGM is not alone. Household names...more

Flaster Greenberg PC

7 Key Practices Companies Should Implement to Ensure Cyber Safety in the Age of Remote Work

Flaster Greenberg PC on

Cybersecurity is critically important in the age of remote work. With more people working from home and accessing company systems and data remotely, the potential for cyberattacks and data breaches has increased...more

BakerHostetler

Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects and analyzes various metrics about the incident response matters we handle. In 2022, we handled over 1,160 incidents. The most striking trends we saw across those incidents were an overall...more

Ankura

Ransomware: The Top 5 Myths and Misconceptions

Ankura on

Ransomware has become a major threat to businesses across the world as cyber-attacks are becoming increasingly sophisticated, resulting in devastating financial damage for companies that fall victim. Not only are important...more

Levenfeld Pearlstein, LLC

Two Fundamental Shifts in the New “National Cybersecurity Strategy”

In March 2023, the Office of the National Cyber Director released the public version of the National Cybersecurity Strategy, which provides strategic guidance for how the U.S. should protect internet users from cyberattacks...more

Constangy, Brooks, Smith & Prophete, LLP

Biden Administration announces “National Cybersecurity Strategy”

On March 2, the Biden Administration released a “National Cybersecurity Strategy,” which it says takes a comprehensive approach to securing cyberspace for all and ensuring the United States is in the best position to take...more

Ankura

Advisory Note - ESXiArgs ransomware attack targets VMware ESXi servers

Ankura on

Are you using VMware ESXi servers? Why should you worry? Unpatched VMware ESXi servers are actively being attacked against a two-year-old remote code execution vulnerability to deploy a new ESXiArgs ransomware. ...more

Woods Rogers

Why You Need MFA Setup For Your Business

Woods Rogers on

Creating passwords needs to be a challenge, not for you to remember but for others to guess. Yet, the digital world is changing. A single sign-on password is pretty easy for unsavory characters to hack. Statistics indicate in...more

Pietragallo Gordon Alfano Bosick & Raspanti,...

What Practices Should a Small Vendor Consider When Applying for Cyber Insurance

Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an...more

Farella Braun + Martel LLP

Using Multi-Factor Authentication as a Prerequisite to Cyber Liability Coverage

Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more

Woodruff Sawyer

6 Things Underwriters Look for in Your Ransomware Protection

Woodruff Sawyer on

While the early days of cyber insurance were often marked by rapid expansion and low losses, recent years have seen the industry weather a vast increase in not just the number of claims but also the severity. The growing...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Ankura

A Cyber Threat Analysis of the Russia-Ukraine Conflict

Ankura on

The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more

Harris Beach PLLC

‘Shields Up’ on Cybersecurity in Wake of Ukraine Conflict

Harris Beach PLLC on

Fears of cybersecurity attacks are mounting in the wake of the Russian invasion of Ukraine. From the war itself, a number of malware variants have been created and are circulating on the internet....more

Jackson Lewis P.C.

The RIPTA Data Breach May Provide Valuable Lessons About Data Collection and Retention

Jackson Lewis P.C. on

Efforts to secure systems and data from a cyberattack often focus on measures such as multifactor authentication (MFA), endpoint monitoring solutions, antivirus protections, and role-based access management controls, and for...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide