Remove 2017 Remove Computer and Electronics Remove Government Remove Insurance
article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

. “Sources said the county is in the process of paying the $500,000 ransom as it’s insured for such attacks.” “The County of Delaware recently discovered a disruption to portions of its computer network. The incident was disclosed on Monday and now Delaware County has paid a $500,000 ransom.

article thumbnail

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 4 May 2018. Thousands of operations and appointments were cancelled as a result of the infection according to the 2017 National Audit Office (NAO) report on the incident, Investigation: WannaCry cyber attack and the NHS. Fourth of may be with you. Or something like that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Janik begins his article by referencing the DLA Piper NotPetya ransomware attack in 2017, as follows: “Imagine it’s a usual Tuesday morning, and coffee in hand you stroll into your office. Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers!

article thumbnail

OPC reconsiders its approach to cross-border data transfers with the Equifax decision

Data Protection Report

Any organization governed by the federal Personal Information Protection and Electronic Documents Act (PIPEDA) will have to re-evaluate and likely adjust its approach to such cross-border data transfers, possibly affecting its outsourcing and cloud computing relationships with vendors and related companies. Section 6.1

IT 40
article thumbnail

Me on the Equifax Breach

Schneier on Security

1 November 2017. Additionally, I am a Fellow and Lecturer at the Harvard Kennedy School of Government --where I teach Internet security policy -- and a Fellow at the Berkman-Klein Center for Internet and Society at Harvard Law School. This was not a minor vulnerability; the computer press at the time called it "critical."

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Victims of Equifax’s 2017 data breach were given the go-ahead to launch a class-action lawsuit. IT Governance released its final Weekly Podcast. Part one covers January to June, and will be followed by part in the coming days.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Figure 3: Digital capability levels. Part 2 discussed customer experience (CX) as a CSF for DT.