The University of Rochester Medical Center has agreed to pay $3 million to the Office for Civil Rights at the U.S. Department of Health and Human Services for the data breaches it suffered during 2013-2017.
Since November 1st, 2018, The Office of the Privacy Commissioner of Canada has received 680 security breach reports, which is six times the volume received during the same period one year earlier.
According to new research, 96 percent of IT professionals agreed that data attackers are outpacing their medical enterprises, holding providers at a disadvantage in responding to vulnerabilities.
Law firms, their clients and all organizations face a volatile insider threat landscape, exacerbated by emerging technologies, interconnected and mobile devices, and new and evolving privacy regulations such as the GDPR and CCPA.
In a recent Security webinar, How You Can Turn Security Training and Awareness into Action, Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, says there are 111 billion lines of code written by an estimated 22 million developers every year. “Building code is like building a house. If you do everything well, you end up with a beautiful, modern and secure house,” says Danhieux.
A majority of enterprises (86 percent) have proactively amplified security initiatives over the last year to combat the increase in cybersecurity attacks. What security threats will they face in the next 12 months?
The University of Maryland Francis King Carey School of Law is launching advanced professional training through their online Master of Science (MS) in Cybersecurity Law and Homeland Security and Crisis Management Law.
More than fifty percent of survey respondents struggle to align security initiatives to business goals and 44 percent aren't clear on what the business goals are, says a Thycotic Cyber Security Team's Guide to Success report.
For a long time, it may have seemed like consumers virtually had no power, and that businesses could do anything they want with individuals’ private information with nearly no repercussions – but that time is rapidly expiring. With increased state regulations, it is clear that businesses must step up their security game by pseudonymizing their data, rendering the data unidentifiable, so when that data travels across state lines and organizational boundaries, the data is still protected, as well as the business and its reputation.