News & Analysis as of

Passwords

Robinson+Cole Data Privacy + Security Insider

Phishing Attacks – Anyone Can Get Pwned

HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #430 – GrubHub Confirms Security Incident Through Third Party Vendor

If you are a GrubHub customer, read carefully. The app has confirmed a security incident involving a third-party vendor that allowed an unauthorized threat actor to access user contact information, including some customer...more

Ankura

The Evolution of Password Management

Ankura on

In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #426 – CyberArk Report Confirms Employees Bypass Cybersecurity Policies

CyberArk, an identity security provider, has issued a new report on employee risk that is a must-read for IT Professionals and executives. The report highlights several findings that are directly related to the risks...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, V 5, Issue 9, November 2024

Welcome to our ninth 2024 issue of Decoded - our technology law insights e-newsletter. How are States Using Generative Artificial Intelligence? and Employee AI Adoption Cools Globally - Why this is important: As...more

HaystackID

Educational Institutions and Cloud Providers Grapple with Data Breach Challenges

HaystackID on

A series of recent cybersecurity breaches reveals significant vulnerabilities within educational and technology institutions, underscoring the urgent need for strengthened defenses. Among the most prominent incidents is the...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more

K2 Integrity

Cybersecurity Awareness Month: Creating and Managing Long, Unique Passwords

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Proskauer - Employee Benefits & Executive...

DOL Updates Guidance on Pension and Health & Welfare Plan Cybersecurity Best Practices

In 2021, the U.S. Department of Labor (DOL) issued 3 documents outlining guidance on cybersecurity practices for benefits plans, which we discussed in a blog post at the time. The DOL recently issued revised versions of the...more

Mitratech Holdings, Inc

One of the Millions Impacted in the USDoD Social Security Data Breach? Here’s What to Do Next.

Millions of individuals could be at the mercy of cybercriminals after a hacking group launched a large-scale data breach impacting 2.9 billion records, including Social Security numbers and other sensitive information. The...more

Array

This Week in eDiscovery: The Need to Preserve Passwords, New Challenges Over Legal Hold Notices and Privilege

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of July 22-28. Here’s what’s...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #405 – Compromised Passwords Continue to Provide Easy Opportunities for Threat Actors

Verizon’s 2024 Data Breach Report, a must-read publication, was published on May 1, 2024. The report indicates that “Over the past 10 years, the use of stolen credentials has appeared in almost one-third (31%) of all...more

Ankura

DOJ Implementation and Enforcement Plans for the Sensitive Data Executive Order—What It Means for Organizations

Ankura on

On February 28, 2024, President Biden signed Executive Order 14117 (the “EO”), on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.” The United...more

NAVEX

Don't Be the Weakest Link – Your Team's Crucial Role in Cybersecurity

NAVEX on

Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more

K2 Integrity

World Password Day: Security Through Long, Unique Passwords

K2 Integrity on

Today is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. Given the large number of...more

Skadden, Arps, Slate, Meagher & Flom LLP

Data Protection Rulings by European Regulators Offer Insights Into Their Security Expectations

Valuable insights into the measures European regulators expect businesses to take to protect data privacy can be found in a report from the European Data Protection Board (EDPB) summarizing decisions under the EU’s General...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Guidepost Solutions LLC

Change Healthcare Ransomware Attack: 10 Lessons Learned

Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more

Proskauer - Law and the Workplace

New York Employers Be Aware – Social Media Access Law Takes Effect

New York employers should take note of a new law that recently took effect that impacts their ability to access applicant and employee social media accounts. The law applies to all employers covered by the New York Labor Law...more

Constangy, Brooks, Smith & Prophete, LLP

NYS ban on employer social media inquiries takes effect

New York employers, are you thinking of asking applicants or employees to divulge their personal social media information? Think again. Last September, Gov. Kathy Hochul (D) signed legislation that prohibits all employers in...more

Bond Schoeneck & King PLLC

Reminder: Restrictions on Accessing Employee Personal Accounts Takes Effect March 12, 2024

As a reminder, beginning March 12, 2024, Labor Law 201-i prohibits employers from requesting, requiring or coercing an employee or job applicant to: (i) disclose a username and password or other login information in order to...more

Carlton Fields

No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns

Carlton Fields on

Dr. Diana Burley has nearly 30 years of experience leading digital transformations and driving cross-sector education, research, and strategic innovation. As American University’s chief research and innovation officer, she is...more

Nelson Mullins Riley & Scarborough LLP

Beware of Scams that Hijack Cellphone Accounts: The Importance of Authentication for Businesses and Consumers: Privacy Day...

Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more

Miller Nash LLP

Data Privacy Week Series: Review Password Hygiene

Miller Nash LLP on

In honor of Data Privacy Week, each day this week Miller Nash is releasing one of our top five recommendations for where businesses should focus their privacy compliance efforts in 2024. If you need assistance reviewing your...more

504 Results
 / 
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide