Remove 2014 Remove Education Remove Insurance Remove Marketing
article thumbnail

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs on Security

The CLOP members said one tried-and-true method of infecting healthcare providers involved gathering healthcare insurance and payment data to use in submitting requests for a remote consultation on a patient who has cirrhosis of the liver. “One of my clients did it, I don’t know how. Encrypting sensitive data wherever possible.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TA505 group updates tactics and expands the list of targets

Security Affairs

TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. and which used emails with subjects pertaining to finance or urgent concerns on insurance policies. The emails used in these campaigns used subjects pertaining to finance or urgent concerns on insurance policies.” XLS or VBA.DOC macros.”

article thumbnail

Me on the Equifax Breach

Schneier on Security

This is exactly the sort of information criminals can use to impersonate victims to banks, credit card companies, insurance companies, cell phone companies and other businesses vulnerable to fraud. And in 2014, the company reported yet another security breach of consumer information. There are more.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Four

eDiscovery Daily

A 2014 Rand study found that 44% of companies didn’t have any formal data governance policy and 22% of firms without a data policy had no plans to implement one. In addition, industry specific regulations in areas such as gaming or insurance can vary from state to state. We want to see you! Who Uses Information Governance?

IT 31
article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Here are three cases related to privilege issues, including one where the court granted a quick peek request by the plaintiff, citing the “court’s heavy caseload and limited resources”: Putting Information on File Share Site without Protection Waives Privilege, Court Rules : In Harleysville Insurance Co. Holding Funeral Home, Inc. Stay tuned!

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

And it gives them the ability to do so much younger in life than many others do and with much less formal education; I care much more about skills than degrees in tech people, but my doctor / lawyer / pilot better have a heap of formal qualifications from many years of study behind them! I know, revolutionary, right?

Education 111