article thumbnail

Insurance Occurrence Assurance?

Andrew Hay

Though the breaches are concerning, the real story is that the financial institution suing its insurance provider for refusing to fully cover the losses. From the article: In its lawsuit (PDF), National Bank says it had an insurance policy with Everest National Insurance Company for two types of coverage or “riders” to protect it against cybercrime losses. This, unfortunately, is the nature of insurance.

article thumbnail

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

As previously posted on our Hunton Insurance Recovery blog , a Maryland federal court awarded summary judgment to policyholder National Ink in National Ink and Stitch, LLC v. State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

Now the financial institution is suing its insurance provider for refusing to fully cover the losses. The email allowed the intruders to install malware on the victim’s PC and to compromise a second computer at the bank that had access to the STAR Network , a system run by financial industry giant First Data that the bank uses to handle debit card transactions for customers. for both intrusions,” the bank said in its lawsuit.

Security 184
article thumbnail

Court Rules Fraud Involving a Computer Is Not ‘Computer Fraud’ under Crime Protection Policy

Hunton Privacy

18, 2016), that a crime protection insurance policy does not cover loss resulting from a fraudulent email directing funds to be sent electronically to the imposter’s bank account because the scheme did not constitute “computer fraud” under the policy. Apache then proceeded to make payment to the fraudulent account when it came time to pay Petrofac’s invoices. Apache recouped a portion of the payments from its bank and attempted to recover the balance from its insurer.

article thumbnail

LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients

Security Affairs

The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers. The security breach took place on October 21, 2022, when the internal security team detected unusual activity on its computer network.

article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

But don’t be fooled by that number – it comes from 106 incidents, which is roughly average for the year. If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog. What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded?

article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

Delaware County, Pennsylvania opted to pay a $500,000 ransom after it was the victim of a DoppelPaymer ransomware attack last weekend. During the last weekend Delaware County, Pennsylvania, was the victim of a DoppelPaymer ransomware attack that brought down part of its network.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. Then one day we had a trip to a larger college that actually had computers and I was hooked! I was educated in computer engineering but my first job was on the business side.

MDM 49
article thumbnail

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

It’s been the usual mix of data breaches this month, with lots of mistakes being made and lots of ransoms being paid. It wasn’t until 1 October that Henderson realised the funds had been sent to a fraudulent account. New Hampshire law firm Weibrecht Law has released information about a data breach it suffered after an employee posted an unencrypted USB stick containing a “client file” via the USPS (US Postal Service). Social insurance numbers.

article thumbnail

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

IT Governance

It’s been the usual mix of data breaches this month, with lots of mistakes being made and lots of ransoms being paid. It wasn’t until 1 October that Henderson realised the funds had been sent to a fraudulent account. New Hampshire law firm Weibrecht Law has released information about a data breach it suffered after an employee posted an unencrypted USB stick containing a “client file” via the USPS (US Postal Service). Social insurance numbers.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Janik begins his article by referencing the DLA Piper NotPetya ransomware attack in 2017, as follows: “Imagine it’s a usual Tuesday morning, and coffee in hand you stroll into your office. Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! The ABA Opinion discusses three duties under its Model Rules: the duty of competence, the duty of communication, and the duty of confidentiality.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., It may trigger mandatory reporting requirements in the jurisdictions where the fund, the fund manager, the bank account and the investors are located. Insurance: The firm should communicate with its insurance company and review policy coverage.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., It may trigger mandatory reporting requirements in the jurisdictions where the fund, the fund manager, the bank account and the investors are located. Insurance: The firm should communicate with its insurance company and review policy coverage.

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into. Do they go to a community night course on computers? I don’t think I’ve even seen a really good reading list on the topic (and much as I’d like for it to be, consuming the offerings on my web site isn’t enough). ”. Electronic Discovery Ethics Evidence

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

In February 2017, plaintiff’s current counsel sent defendant a letter, stating plaintiff had retained them to represent her in connection with employment discrimination claims and advising defendant of its obligation to preserve records, videos, and files pertaining to plaintiff’s employment and discharge. Defendant does not address the duty it had to preserve the copy of the video kept in Rauschelbach’s desk drawer.”. Case Law Electronic Discovery Preservation Sanctions

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Unfortunately, far too many entrepreneurs are simply unaware of the threat or don’t know how to be watchful for it. Dun & Bradstreet said that so far this year it has received over 4,700 tips and leads where business identity theft or malfeasance are suspected.

article thumbnail

OPC reconsiders its approach to cross-border data transfers with the Equifax decision

Data Protection Report

Any organization governed by the federal Personal Information Protection and Electronic Documents Act (PIPEDA) will have to re-evaluate and likely adjust its approach to such cross-border data transfers, possibly affecting its outsourcing and cloud computing relationships with vendors and related companies. This included social insurance numbers and other sensitive personally identifiable information. It was determined Equifax Inc.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. KrebsOnSecurity turns 13 years old today.

Security 233
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

The webcast is CLE accredited in selected states, so come check it out! Court Orders Defendant to Respond to Interrogatories to Identify Number of Phone Calls it Made : In Franklin v. Case Law Electronic Discovery

article thumbnail

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 4 May 2018. The Department of Health and Social Care has signed a deal with Microsoft to upgrade the NHS’s extensive IT estate to Windows 10 in an attempt to bolster its cyber resilience in the wake of last year’s WannaCry ransomware outbreak. The introduction of a centralised Windows 10 agreement will ensure a consistent approach to security that also enables the NHS to rapidly modernise its IT infrastructure.”.

article thumbnail

First Ever Multi-State Data Breach Lawsuit Targets Healthcare Provider: Cybersecurity Trends

eDiscovery Daily

According to The Expert Institute ( 12 US States Join Forces to File First Ever Multi-State Data Breach Lawsuit , written by Victoria Negron), an Indiana court will serve as the venue for the first-ever multistate data breach lawsuit, as the attorneys general of twelve US states join forces against a healthcare provider and its subsidiary. Electronic Discovery Privacy Security

article thumbnail

Court Rules Non-Party Subpoenaed ESI Not Subject to 100-Mile Boundary: eDiscovery Case Week

eDiscovery Daily

Cauthron, noting that the non-party “subpoena at issue does not require the travel or attendance of any witnesses and Plaintiff is requesting the production of electronic documents” , found that “there is no violation of the 100-mile limitation for electronic documents pertaining to Rule 54” and granted the plaintiff’s Motion to Compel Compliance with Subpoena directed to the non-party. Case Law Electronic Discovery Evidence ProductioneDiscovery Case Week continues!

article thumbnail

Standardizing the Non-Standard Digital Forensics Protocol, Sort Of: eDiscovery Best Practices

eDiscovery Daily

Leave it to Craig Ball to come up with a proposed form examination protocol for performing forensic examinations. And, leave it to Craig to teach you what you need to know to use and adapt such a protocol. Would you skip to the end of a movie to see how it turns out? (I’m I’m not sure that’s the best analogy, but it’s the best I can think of at the end of a long day)… Regardless, you should take the opportunity to learn the concept so that you can apply it properly.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. Covering all computers and file cabinets in plastic sheeting. . It was grim. The insurance coordinator proposed stabilizing in place.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. As it’s open-source, organizations can redistribute and modify their needs for Windows, Linux, and Unix systems.

article thumbnail

Largest hospital system in New Jersey was hit by ransomware attack

Security Affairs

The largest hospital in New Jersey announced on Friday that a ransomware attack last week disrupted its network and that it paid a ransom. 2 and forced it to cancel some surgical and other procedures, though no patients were harmed and its emergency rooms kept seeing patients.”

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

But first, it’s also worth noting that Tom O’Connor and I will be discussing some of these cases – and what the legal profession can learn from those rulings – on Thursday’s webcast Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 at noon CT (1pm ET, 10am PT). The webcast is CLE accredited in selected states, so come check it out! Just because you don’t physically have your hands on the data doesn’t mean you’re not responsible for it.

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

A company in Wisconsin had a “chipping party” in 2017 to implant microchips in some of its employees to make it easier for them to access the buildings and systems and to buy food in the company break room. [1]. Each type of IoB device brings with it benefits and risks.

article thumbnail

Information Management in the Not-So-Distant Future of Health Care

AIIM

Or so it seems. Everything but big tech, like MRI equipment, and critical or very specialized care gradually will be “constructively cannibalized,” so it’s more often outbound, home-based, and virtually augmented. We have the best health care in the world – and it’s killing us.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

But even when passwords are secure, it’s not enough. When this is happening, it’s clear that organizations either aren’t using MFA or are finding ways around it. Passwords alone won’t cut it. This post has been updated for 2021.

article thumbnail

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. » Related Stories Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk Spotlight Podcast: 15 Years Later Is Cybersecurity Awareness Month Working? It is a situation that defeats the idea of standards to begin with.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. According to the complaint, over a period of 19 days, hackers were able to infiltrate the Company’s computer systems. In particular, it alleges that the Company had an incomplete incident response plan.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

While the PDPL contains the main features of a modern data protection law, it cannot be considered a direct analogue of the GDPR. It becomes fully effective on 23 March 2022. It is a common practice in the region for official documents such as passports or ID cards to be photocopied.

Privacy 96
article thumbnail

HHS Announces HIPAA Settlement with UMass

Hunton Privacy

On November 22, 2016, the Department of Health and Human Services (“HHS”) announced a $650,000 settlement with University of Massachusetts Amherst (“UMass”), resulting from alleged violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy and Security Rules. . UMass did not have firewalls in place to guard against unauthorized access to ePHI transmitted over an electronic communications network.

article thumbnail

The U.S. Office of the Comptroller of the Currency Seeks Comment on Digital Innovation by Banks

Data Matters

Office of the Comptroller of the Currency (OCC) has issued an Advance Notice of Proposed Rulemaking (ANPR) 1 seeking input on how best to accommodate new technology and innovation in the business of banking, in connection with the OCC’s “comprehensive review” of its regulations at 12 C.F.R. The U.S.

article thumbnail

Speed up digital transformation and data literacy with Data Intelligence Cloud for healthcare

Collibra

The healthcare and life sciences industry are at an inflection point in its digital transformation journey. The global pandemic has further exposed vulnerabilities and gaps in the healthcare system and its ripple effect on the broader ecosystem of partners.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

Five Steps to HIPAA Security Compliance

HIPAA

The health insurance portability and accountability act has set various guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing and sharing any electronic medical data to keep patient data secure. This means that a medical practice could be using electronic systems which are not compliant with HIPAA standards.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

Sometimes, as with our cars, it does the exact opposite. There is no easy way around it. And there'd be no way to set the phone to vibrate during a meeting except by powering it off. A sophisticated set of encryption and electronics is at work inside the vehicle. Sometimes it does the exact opposite. It’s about challenging our expectations about people who hack for a living. To take it. Lacking any formal computer training.