BreachExchange: by date

299 messages starting Jan 04 16 and ending Mar 31 16
Date index | Thread index | Author index


Monday, 04 January

2016 – The Year of the Cyber Exploit Audrey McNeil
Vishing and smishing: The rise of social engineering fraud Audrey McNeil
Five Keys To Crafting A Cybersecurity Policy For Your Business Audrey McNeil
Incident Response Tip: Five Ways to Improve Information Security and Reduce the Impact of a Data Breach Audrey McNeil
The Need for Private-Public Partnerships Against Cyber Threats -- Why A Good Offense May be Our Best Defense. Audrey McNeil
Cyber insurance 2015: Inside a robust and rapidly changing market Audrey McNeil

Tuesday, 05 January

6 cyber best practices for the new year Audrey McNeil
When hacking got personal in 2015 Audrey McNeil
5 sins cybersecurity executives should avoid Audrey McNeil

Wednesday, 06 January

No Cybersecurity Crying in ’16 Audrey McNeil
Victims or Villains: Intelligent Incident Response Can Save the Day Audrey McNeil
Is OCR Scrutinizing Those with Multiple Breaches? Audrey McNeil
Hocus-pocus! The stupidity of cybersecurity predictions Audrey McNeil
What's your cybersecurity whistleblower strategy? Audrey McNeil
Increasing Demand for Cyber Insurance Audrey McNeil

Thursday, 07 January

Linode Resets Passwords as DDoS Attacks Continue Inga Goddijn
Employment Dept. computers still vulnerable a year after breach Inga Goddijn
Massachusetts Court: Patients Have Standing to Sue for Data Breach Based on Data Exposure Alone Inga Goddijn
Ukrainian Power Grid Hack: 9 Questions Inga Goddijn
Opinion: Squirrels are bigger threat than hackers to US power grid Inga Goddijn
Time Warner Cable Warns Some Customer Email Addresses, Passwords May Be Compromised Richard Forno

Friday, 08 January

You can't stop what you can't see: Mitigating third-party vendor risk Audrey McNeil
Five Security Must-do's For First Time Cloud Users Audrey McNeil
What we can learn from three key 2015 data breaches Audrey McNeil
Companies ill-prepared for cyber attacks in 2016 Audrey McNeil
Security leaders need to ask this question to get the success they seek Audrey McNeil
CRS sheds light on enforcement authority in data breach notification legislation Audrey McNeil

Tuesday, 12 January

TRENDnet Devices Bundle Infamous scfgmgr Service Audrey McNeil
Hacked Companies ‘Should Go Public’, Says Ex-Minister Audrey McNeil
Look for additional data breach class action cases, standing decisions and shareholders’ derivative suits in 2016 Audrey McNeil
10 tips to help you defend and protect your business from ID theft Audrey McNeil
Ensuring IT resilience in the face of change Audrey McNeil
Report your data breach: 5 best practices to avoid breaching data regulation Audrey McNeil

Wednesday, 13 January

No More Narrow Focus: Is 2016 the Year of Cyber-Risk? Audrey McNeil
Lessons from penetration testing: four simple IT security mistakes that leave a business vulnerable Audrey McNeil
How the CFO can act as any cybersecurity team's 'quarterback' Audrey McNeil

Thursday, 14 January

Lessons learned? A look back at five cyber-security trends of 2015 Audrey McNeil
Why Hackers Want to Attack Your Small Business Audrey McNeil
Managing the Cybersecurity Threat Audrey McNeil
Don't shortchange website security Audrey McNeil
What Star Wars can teach us about cyber ethics Audrey McNeil

Friday, 15 January

Card Breach Affects 250 Hyatt Hotels Worldwide Inga Goddijn
Over 22,000 USBs May Have Been Left in Dry Cleaners Inga Goddijn
This Court Case Could be a Major Blow to the FTC’s Data Security Efforts Audrey McNeil
A Mobile Device Triggered a HIPAA Breach In Your Office…Now What? Audrey McNeil
Data governance and protection Audrey McNeil
Cyber crime is a threat and British businesses can’t afford to ignore it Audrey McNeil

Monday, 18 January

A new dawn of data breach awareness in 2016 Audrey McNeil
What New Cybersecurity Rules in Europe Mean for Financial Bodies Audrey McNeil

Wednesday, 20 January

Company Leaders Worry About Liability for Breaches Audrey McNeil
What the board needs to know about cybersecurity compliance Audrey McNeil
Perspective: What Will Be the Defining Cybersecurity Issues In 2016? Audrey McNeil
PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth Audrey McNeil
The Knock-Down, Drag-Out Fight Over Cybersecurity Legislation Audrey McNeil
New year, new trends in cybersecurity Audrey McNeil

Thursday, 21 January

Email security – it’s up to the CIO and CEO! Audrey McNeil
Risk-Averse CFOs A Natural Fit For Cybersecurity Audrey McNeil
The Perils of BYOD Policies Audrey McNeil
4 Simple Ways to Help Protect Your Business From Cybercrime Audrey McNeil
Legal Mandates Fuel Cybersecurity Insurance Growth Audrey McNeil
Ensuring EHRs Are Secure: A New Approach Audrey McNeil

Friday, 22 January

The Privilege of PR: Application of the Attorney-Client Privilege to Crisis Communications and Public Relations in Breach Response Planning Audrey McNeil
Four health care providers report breaches: Protecting data not high priority? Audrey McNeil
OCR issues new guidance on individuals’ access to PHI: Is your access policy compliant? Audrey McNeil

Monday, 25 January

What is your risk number? Audrey McNeil
Why we need a reality check on passwords Audrey McNeil
Data Breach Class Action Against Michael Stores Doesn’t Stick Audrey McNeil
Identity Theft Is No Small Problem: How to Protect Your Business Audrey McNeil
Only a quarter of cyber security employees say their firm has cyber insurance Audrey McNeil

Tuesday, 26 January

Vtech restores some online services after hack Audrey McNeil
Three steps to help manage security alert overload Audrey McNeil
Malware in the Hospital Audrey McNeil
What is on the cyber security horizon in 2016? Audrey McNeil
Survey says: Data breaches in other industries will damage financial institutions Audrey McNeil

Wednesday, 27 January

Security by design - an essential requirement for privacy Audrey McNeil
Tax Benefit for Early Cybersecurity Protections Audrey McNeil

Thursday, 28 January

Wendy's investigating possible POS breach Inga Goddijn
10 social engineering exploits your users should be aware of Inga Goddijn
2016: The year of the gas station skimmer Inga Goddijn
Post-Breach Costs And Impact Can Last Years Inga Goddijn
Why any organization can suffer a healthcare breach, and 5 tips for keeping PHI safe Inga Goddijn
Wendy’s: Where’s The Breach?! Audrey McNeil

Friday, 29 January

CSI: Cyber-Attack Scene Investigation--a Malware Whodunit Audrey McNeil
2016 HIPAA Audits to Begin: Are you Confident in Your HIPAA Compliance? Audrey McNeil
As Health IT Matures, Security Approaches Must Mature With It Audrey McNeil
Privacy In The Age Of The Data Breach Audrey McNeil
TalkTalk cyber attack a ‘car crash’ which should warn industry, says watchdog Audrey McNeil

Monday, 01 February

Why Data Security—and Third-Party Vendors—Is an NCUA Priority Audrey McNeil
ICO launches data privacy assessment tool for SMEs Audrey McNeil
SMEs are at risk from cyber-criminals Audrey McNeil
In era of data breaches, businesses need strong document policies Audrey McNeil

Wednesday, 03 February

Security Think Tank: User education is first line of defence against ransomware Audrey McNeil
5 Ways a Firm Can Stop a Data Breach Lawsuit Audrey McNeil
One-Quarter Of Organizations Do Not Encrypt Sensitive Data Audrey McNeil
What Solutions Providers Can Learn From The Potential Wendy's Data Breach Audrey McNeil
Bank Tellers, With Access to Accounts, Pose a Rising Security Risk Audrey McNeil
Phishing Attacks Among Greatest Plague Facing Healthcare Audrey McNeil
Defending Your Data Audrey McNeil

Thursday, 04 February

Anon steals a bunch of data from NASA, threatens to release it Inga Goddijn
Sophisticated hacking system may be behind hoax threats received by Australian schools Inga Goddijn
5 reasons you need to hire a Chief Privacy Officer Audrey McNeil
Businesses underestimating growing cyber security threats Audrey McNeil
Security Think Tank: Four steps for companies to protect against ransomware Inga Goddijn
How cyber criminals use social engineering Audrey McNeil
7 steps hackers take to execute a successful cyber attack Inga Goddijn

Friday, 05 February

2015 Reported Data Breaches Surpasses All Previous Years Inga Goddijn
How SMBs can avoid being the victim of a cyber attack Audrey McNeil
Tips for choosing the best encryption solution for your organization Audrey McNeil
Five Cybersecurity Questions Every Executive Should Ask Audrey McNeil
TalkTalk's cyber-security lesson Audrey McNeil
Data Breaches: ‘The Third Certainty in Life’ Audrey McNeil

Monday, 08 February

Rise of the ethical hackers Audrey McNeil
ICO Announces Revised Privacy Practice Audrey McNeil
Four key predictions for enterprise security in 2016 Audrey McNeil
DHS Data Leaked, Who’s Next? Audrey McNeil

Tuesday, 09 February

The surprising cyber risks facing your small business clients Audrey McNeil
Tearing Down the Silos Audrey McNeil
Cyber dominates top ten legal risks for business in 2016 Audrey McNeil
The Seventh Circuit Revisits Standing for Data Breach Class Actions Audrey McNeil
Latest Office of Civil Rights Enforcement Action: Underbed Storage is Not Appropriate for Personal Health Information Inga Goddijn
Firms Feel More Confident In Ability to Thwart Data Breaches Audrey McNeil

Wednesday, 10 February

TalkTalk Took a Big Bath Over Breach Audrey McNeil
How Much Would You Pay to Prevent a Breach? Audrey McNeil
5 tips to protect your admin credentials Audrey McNeil
Dealing With Careless Users as a CIO Audrey McNeil
You Could Lose More Than Just Customers: Why You Should Lock Up to Crack Down on Cyber Risks Audrey McNeil
Litigation Watch: Can a Third-Party Vendor Be Left Holding the Bag After a Breach? Audrey McNeil
Will You Experience The Next Data Breach? Audrey McNeil

Thursday, 11 February

Cyber attacks remain top business threat for second year in a row Audrey McNeil
Professor sheds light on increase in cyber crimes Audrey McNeil
Data protection starts with security, but disclosure remains key Audrey McNeil

Friday, 12 February

Site that Shared Alleged FBI, DHS Data Shut Down Audrey McNeil
Violate Patient Data Safety At Your Peril, Warns Judge Audrey McNeil
Data loss: five steps to protect your customers’ business Audrey McNeil
VTech Security: Fool Me Once ... Audrey McNeil
Specifically identifying your trade secrets is the first step in being able to protect them Audrey McNeil
New Year, new threats: 6 email resolutions to protect your data Audrey McNeil

Monday, 15 February

Preventing data breaches and leakage: Important steps for website owners Audrey McNeil
Cybersecurity and international data transfer Audrey McNeil

Wednesday, 17 February

Government Foreshadows New Privacy Obligations Inga Goddijn
5 rules for effective privileged user account management Inga Goddijn
Top tips: The Do’s and Don’ts of cybersecurity for retailers Inga Goddijn
JavaScript Analytics Code Can Be Used to Compromise US Banks Inga Goddijn

Friday, 19 February

Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security Audrey McNeil
Data-Breach Claims Against Anthem Not Preempted by FEHBA Audrey McNeil
Hospital Forced Back to Pre-Computer Era Shows the Power of Ransomware Audrey McNeil
3 reasons why your cybersecurity plan needs to be revised Audrey McNeil
Tellers are overlooked as threat to data safety Audrey McNeil
Internal auditors challenged by cyber-security, data quality Audrey McNeil

Monday, 22 February

Sorry, Your Business Will Never Be Safe. But Here's What You Can Do About It. Audrey McNeil
Dark Web Honeypot Shows How Quickly Leaked Passwords Attract Hackers Inga Goddijn
This is what it looks like when your website is hit by nasty ransomware Audrey McNeil
No One Should Ever Pay to Remove a Bitcoin Ransomware Infection Audrey McNeil
Healthcare data breaches lead more patients to withhold information from doctors Audrey McNeil
Cyber security needs to be to tackled from all angles Audrey McNeil
Stop waiting and start hunting Audrey McNeil

Tuesday, 23 February

Changes To The Mailing List Inga Goddijn
Deleting Data Vs. Destroying Data: The Difference Can Be Damning Audrey McNeil
The Lurking Threat Audrey McNeil
Cyber thieves cash in big with just 50 credit cards. Audrey McNeil
Bringing better security to BYOD Audrey McNeil
Cyber insurance offers companies a safety net from online hackers Audrey McNeil
HIPAA enforcement in 2016: Is your practice ready? Audrey McNeil
Responsibility Shifting for Cyber Attacks? Audrey McNeil
How to respond to a cyberattack Audrey McNeil
Beleaguered OPM CIO Departs Audrey McNeil
You Can't Hide Behind Your EULA Audrey McNeil
Class Action Claims Wendy’s Negligently Exposed Customer Payment Info In January Breach Audrey McNeil
Apple, FBI Escalate Crypto Fight Audrey McNeil

Wednesday, 24 February

Data Breach Class Action Against SuperValu Doesn’t Check Out Audrey McNeil
Why stolen laptops still cause data breaches, and what's being done to stop them Audrey McNeil
While hackers hit the headlines, insider threats should not be forgotten Audrey McNeil
The Sophisticated Hack: Business Email Compromise Audrey McNeil
Next-gen cyber threats Audrey McNeil
Government IT is an Atari Game in an Xbox World Audrey McNeil

Thursday, 25 February

How To Protect Your Business From Social Media Security Threats Audrey McNeil
Cyber Liability a Growing Threat to CPAs Audrey McNeil
The next step for information risk management Audrey McNeil
Data Breaches are on the Rise in Australia: What if it Happens to You? Audrey McNeil
The importance of cyber due diligence in M&A transactions Audrey McNeil
Why CXOs ignore data quality problems Audrey McNeil

Friday, 26 February

Cyber security is more about you than technology Audrey McNeil

Monday, 29 February

Holistic Data Protection for the SMB: Five Steps for MSPs Audrey McNeil
Cyber security is a risk management game Audrey McNeil
The IRS Hack Was Twice as Bad as We Thought Audrey McNeil
Are Your Trade Secrets Gone Without A Trace? Audrey McNeil
Cybersecurity rising as health IT concern Audrey McNeil
Ransomware can be an expensive phishing lesson Audrey McNeil

Tuesday, 01 March

10 Lessons From FTC Guidance on Data Security Audrey McNeil
The human problem at the heart of Snapchat’s employee data breach Audrey McNeil
Rules of Cybersecurity Changing for Healthcare Sector Audrey McNeil
Beware Of Social Media And Cybersecurity Audrey McNeil
Ridiculously simple security settings your IT guy wishes you knew Audrey McNeil

Wednesday, 02 March

PC Matic… Is It As Amazing As Seen on TV? Inga Goddijn
Consumer Financial Protection Bureau takes action against Dwolla for misrepresenting data security practices Inga Goddijn
PHP ransomware attacks blogs, websites, content managers and more… Inga Goddijn
FAQ: What the heck happened to Linux Mint? Inga Goddijn
4 healthcare data breach lessons to take to heart Inga Goddijn
Bad vibrations: UCI researchers find security breach in 3-D printing process Inga Goddijn

Thursday, 03 March

Got ransomware? What are your options? Audrey McNeil
Cybersecurity checklist is a cyber strategy tool for increasing attack cost Audrey McNeil
Third of US banks OK with passwords even social networks reject Audrey McNeil
App security: The most overlooked cybersecurity measure Audrey McNeil
Contract Corner: Contract Terms Associated with Data Breaches—It’s a Balancing Act Audrey McNeil
How big data, info sharing make hackers' lives harder Audrey McNeil

Friday, 04 March

IoT Security Checklist: Get Ahead Of The Curve Audrey McNeil
Good security begins with the endpoint in mind Audrey McNeil
How Secure is Your Company Data? Internal Security Breaches and How to Avoid Them Audrey McNeil
Businesses are still scared of reporting cyberattacks to the police Audrey McNeil

Monday, 07 March

Update on Canadian Data Breach Regulations Audrey McNeil
Create your human firewalls Audrey McNeil
Data breaches often result in CEO firing Audrey McNeil
Keeping pace with the evolving cyber crime landscape Audrey McNeil
Are Retirement Plan Fiduciaries Required to Prevent Cyberattacks? Audrey McNeil
Here’s the Real Way Hackers Will Get Your Information Online Audrey McNeil

Tuesday, 08 March

Why Cybersecurity Should Be Every Company's Priority Audrey McNeil
Thwarting the threat actors: What government can do Audrey McNeil
What are you doing to spot a breach? Audrey McNeil
California Data Breach Report Defines “Reasonableness” Standard for Data Protection Audrey McNeil
10 Habits Threatening Your Company's Data Audrey McNeil
Solving the bulk password theft puzzle Audrey McNeil

Wednesday, 09 March

EU-U.S. Privacy Shield Framework Text Published: Imposes New Obligations on U.S. Entities that Seek Data Transfers from the EU Inga Goddijn
Treating IP addresses as personal data is best approach for businesses, says expert Inga Goddijn
HHS Office For Civil Rights Releases A Crosswalk Between HIPAA Security Rule And NIST Cybersecurity Framework Inga Goddijn
Not worth the cost: 3 lessons about unprotected PHI Inga Goddijn
Seven ways to detect ransomware beyond antivirus Inga Goddijn

Thursday, 10 March

FOLLOW UP: IoT Security Checklist: Get Ahead Of The Curve Inga Goddijn
Top 10 Ways to Protect Your Company’s Data Audrey McNeil
Combatting ransomware with a few easy threat mitigation steps Audrey McNeil
Halting Hackers From Sabotaging Computer Systems Audrey McNeil
Why security is really all about trust Audrey McNeil
Bitcoin is Not the Root Cause of Ransomware Audrey McNeil

Friday, 11 March

Healthcare data breaches on the rise: Implications and solutions Audrey McNeil
Securing Payment Card Data: Three Actions to Take Now Audrey McNeil
Plaintiffs Use Privacy Pledge Against Insurer in Data Breach Claim Audrey McNeil
Computer security: If you have to call the FBI, it’s too late Audrey McNeil
How to boost employee awareness in the age of the insider threat Audrey McNeil

Monday, 14 March

EHR security breach does not constitute false Meaningful Use attestation Audrey McNeil
Follow the data to improve security preparedness, hospital CISO says Audrey McNeil
Keeping Patient Information Secure When Implementing IoT Audrey McNeil
Breach notification in Europe: The GDPR’s far-reaching implications Audrey McNeil
Staminus Breach: Just How Bad Is It? Audrey McNeil

Tuesday, 15 March

Who watches over your data – and how do you know it won't go AWOL? Audrey McNeil
Sixth Circuit Rejects FCA Claim Based on Health Data Breach Audrey McNeil
Protect Your Employees’ Personal Information or You’re Putting Your Business at Risk Audrey McNeil
Home Depot deal may set standard for cyber breach settlements Audrey McNeil

Wednesday, 16 March

5 Best Practices to Secure Your Business Data Audrey McNeil
Cyberthreat Information Sharing Privacy Concerns Raised Audrey McNeil
The 10 Essential Cybersecurity Training Issues for Your Employees Audrey McNeil
Virginia Tech Laments Secrecy of Hacker Tip-Offs from Feds Audrey McNeil
Cyber-Insurance: Is It Right for Your Business? Audrey McNeil
CFOs Get A Break From Hackers Audrey McNeil

Thursday, 17 March

$1.55 million settlement underscores the importance of executing HIPAA business associate agreements Inga Goddijn
HR Departments Part 2: Still Out Phishing? Inga Goddijn
The Danger of Apps that Die Inga Goddijn
Improper disclosure of research participants’ protected health information results in $3.9 million HIPAA settlement Inga Goddijn
Document shredder leaves data security in tatters Audrey McNeil
ICO warning over personal data breaches Audrey McNeil
Why manual processes become security risks Audrey McNeil

Friday, 18 March

What we’ve learned from malware epidemics Inga Goddijn

Monday, 21 March

FBI and Microsoft Warn of Samas Ransomware Inga Goddijn
When Business Computers Are Held For Ransom, Downtime Is Biggest Cost Inga Goddijn
Don't want your new system getting hacked? Follow these 13 steps and you might just avoid it Inga Goddijn
Why Software Patching is Essential in Today's World Inga Goddijn
Unhealthy Rise In Healthcare Fraud: 5 Tips For Protecting Patient Privacy Inga Goddijn
NIST releases updated telework guidance Inga Goddijn

Tuesday, 22 March

Ramping up Employee Cyber Security Training in 2016 Audrey McNeil
5 Takeaways from FDA's Draft Guidance on Postmarket Management of Cybersecurity Risks in Medical Devices Audrey McNeil
Installed Faster Than You Can Say Skimmer! Audrey McNeil
Amid Hacking Threats, Law Firms Turn to Cyber Insurance Audrey McNeil
A third of email sent to U.S. House is malware, a virus or spam Audrey McNeil

Wednesday, 23 March

The agency that stepped up: Federal Trade Commission Audrey McNeil
Security from the Ground Up: The Need for Data Classification Audrey McNeil
Australian industry lashes out at data breach notification scheme Audrey McNeil
Throwaway security terms and the danger to businesses Audrey McNeil

Thursday, 24 March

Cyber Insurance: Make Sure You Understand Your Coverage Audrey McNeil
Data breach four-times worse than CEO quitting Audrey McNeil
Ransomware: Why does this cyber threat keep growing? Audrey McNeil

Friday, 25 March

Security doesn't just happen, cyber experts say Audrey McNeil
Protecting your business against fraud Audrey McNeil
Protecting Online Information Audrey McNeil

Tuesday, 29 March

How to Prepare for 'Phase Two' HIPAA Compliance Audits Inga Goddijn
Shoppers blame retailers for security breaches Audrey McNeil
CIOs Need To Think More Like CEOs Audrey McNeil
Breakthrough in cybersecurity is no phish story Audrey McNeil
Hacking Hospitals And Holding Hostages: Cybersecurity In 2016 Audrey McNeil
Ransomware gets a lot faster by encrypting the master file table instead of the filesystem Audrey McNeil
3 Sources of Cyberattacks – and 3 Preventive Steps Government Can Take (Industry Perspective) Audrey McNeil

Wednesday, 30 March

It takes 69 days to discover breaches Audrey McNeil
Details of Anthem's massive cyberattack remain in the dark a year later Audrey McNeil
MedStar Cyber Attack Shows Need for HHS to Implement Cybersecurity Law Audrey McNeil
When it comes to cybersecurity, don't overlook staff education Audrey McNeil
Why internal endpoints are a quick win in the fight against data theft Audrey McNeil
How Businesses Can Avoid a Data Loss Nightmare Audrey McNeil

Thursday, 31 March

Without information security processes, you are flying blind Audrey McNeil
Idea to retire: Information security is IT security Audrey McNeil
Cyber insurance rates fall with lull in major hacks Audrey McNeil
Tools for protecting your clients’ information are all around you Audrey McNeil
Amid Data Breaches, State Agencies Need to Deploy Backup Technologies Audrey McNeil