Posts

Alabama county officials paid as much as $50K in ransom to hackers for stolen data

http://www.foxbusiness.com/features/2017/09/25/alabama-county-officials-paid-as-much-as-50k-in-ransom-to-hackers-for-stolen-data.html

Deloitte Gets Hacked: What We Know So Far

Jeff John Roberts 6:17 PM ET A bombshell report on Monday revealed that Deloitte was hit by a major cyber attack that compromised its email system and certain client records. The news is a major black eye for one of the world's "big four" accountancy and consulting firms—especially since a major part of Deloitte's business is selling cyber security. The full extent of the hacking episode isn't clear, but details are beginning to trickle out, including from Brian Krebs, a well-respected security journalist who says he has heard from sources close to the Deloitte. Here's a Q&A about we know and don't know about the latest high profile security attack. What did the hackers steal? The initial report of the Deloitte breach came from the Guardian, which revealed hackers had compromised the "confidential emails and plans of some of its blue-chip clients." In response, the firm confirmed it had suffered a cyber-attack, but played down the significan

Regulatory Scrutiny Ramping Up in the Rapidly Expanding Internet of Things

Image
All three major branches of the federal government, as well as the states, have begun to tackle regulation of the IoT. Natasha Kohne and Crystal Roberts, Akin Gump , Law Technology News April 6, 2017 In another effort to regulate privacy and security in the rapidly-expanding internet of things (IoT), the Federal Trade Commission filed a lawsuit earlier this year against D-Link, a global manufacturer of computer networking equipment and other connected devices, for inadequate security practices and deceptive claims regarding the security of its routers, IP cameras and baby monitors. Among other allegations, the FTC alleges—under its authority to regulate unfair and deceptive practices under Section 5 of the FTC Act—that D-Link's security failures allowed unauthorized access to cameras' live feeds and left its routers vulnerable to hacking. This is one example in a line of cases where a government agency attempts to regulate a relatively new and emerging phenomenon:
Image
Tightening down your security while improving businesses processes is our business. We specialize in IT security solutions that are easy to deploy, train, and manage. Let us start a discussion with a free consultation and check out our website to find out more about our practice proven solutions. www.datasensei.com  Legal Departments Face High Data Breach Risk, But Few Easy Solutions legaltechnews.com no plus ones no comments
Image
Some ransomware strains are free to decrypt Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure. The state of ransomware in 2017 It’s been almost 30 years since malware was first created that could encrypt locally-stored data and demand money in exchange for its safe return. Known as ransomware, this type of malware has gone through multiple periods of popularity. 2006 and 2013 saw brief spikes in infections, but they’ve never been as bad as they are now. In 2015, the FBI estimated that ransomware attacks cost victims $24 million, but in the first three months of 2016 it had already racked up more than $209 million. At the beginning of 2017, more than 10% of  all malware infections  were some version

HIPAA-compliant email, file sharing and web application access

Many healthcare organizations are using this service for secure HIPAA-compliant email and file sharing. If you’re looking for a highly productive, cost-effective solution that will also help you comply with HIPAA and support regulations for data retention, I’d like to make sure you’re aware of this service. Our Compliance and Security plan includes highly available email with secure file sharing and essential related services including mobility. The highlights are: •     Independently audited for HIPAA •     Includes all the HIPAA-compliant services you need, plus archiving for data retention regulations •     Secure your communications, shared files, and web app access with encryption, tamper-proof archiving, and two-factor authentication •     Supported by annual SOC2 Type II audits of security and privacy controls This plan includes all the essential services you need to maximize productivity and patient  responsiveness and security: •     All required service