Remove 12
Remove 2011 Remove 2017 Remove Education Remove Security
article thumbnail

Colorado Department of Higher Education (CDHE) discloses data breach after ransomware attack

Security Affairs

The Colorado Department of Higher Education (CDHE) finally disclosed a data breach impacting students, past students, and teachers after the June attack. In June a ransomware attack hit the Colorado Department of Higher Education (CDHE), now the organization disclosed a data breach.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

Snyder says his experience as head of Gateway Computers and as an investor in tech security startups, prior to entering politics, gave him an awareness of why putting Michigan ahead of the curve, dealing with cyber threats, would be vital. “I Merit is an acronym for the Michigan Educational Research Information Triad.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

Each of these mule recruitment sites had the same security weakness: Anyone could register , and after logging in any user could view messages sent to and from all other users simply by changing a number in the browser’s address bar. ” Messages to and from a money mule working for Aqua’s crew, circa May 2011.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Designing an Enterprise-Level Approach.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

12 of the Massachusetts Declaration of Rights), and the court remanded the case to the Superior Court for entry of an order compelling the defendant to enter the password into the cell phone at issue in the case. 2017: Part 1 , Part 2 , Part 3 , Part 4. 2011: Part 1 , Part 2 , Part 3 , Part 4. Stay tuned! So, what do you think?

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Where the Information Commissioner gives notices to data controllers, she can now secure compliance, with the power to issue substantial administrative penalties of up to 4% of global turnover. How then will we secure adequacy without adhering to the charter? To date, the Commission has adopted 12 such decisions.

GDPR 120