Remove Computer and Electronics Remove Information Security Remove Insurance Remove Passwords
article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

. “Sources said the county is in the process of paying the $500,000 ransom as it’s insured for such attacks.” “The County of Delaware recently discovered a disruption to portions of its computer network. BleepingComputer was informed that the Delaware County was hit by the DoppelPaymer ransomware gang.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

However, a large part of the loss has been offset by the company’s cyber insurance: Equifax announced that it maintains “$125 million of cybersecurity insurance coverage, above a $7.5 million deductible”, and, since announcing the cyber security incident in September 2017, has “recorded insurance recoveries of $60.0

article thumbnail

OCR Enters into Record Settlement with Anthem

Hunton Privacy

Three years ago, in February 2015, OCR opened a compliance review of Anthem, the nation’s second largest health insurer, following media reports that Anthem had suffered a significant cyberattack. prevent unauthorized access to ePHI. submit annual compliance reports for a period of two years.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., standard login passwords). hardware tokens and one-time passwords). what a person has (e.g., biometrics).

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., standard login passwords). hardware tokens and one-time passwords). what a person has (e.g., biometrics).

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Countless office workers were forced to get back to their jobs after Reddit suspended a host of accounts in light of security concerns. Part one covers January to June, and will be followed by part in the coming days.