article thumbnail

Australian Telecom Watchdog Sues Optus Over 2022 Data Breach

Data Breach Today

Telecom Company Also Faces OAIC Investigation and Potentially Millions in Fines The Australian Communications and Media Authority says it has filed proceedings against Optus in a federal court as the company failed to protect sensitive customer data during a data breach in September 2022.

article thumbnail

Major Health Data Breaches: How Are Trends Shifting in 2024?

Data Breach Today

Midyear Analysis of HHS OCR 'Wall of Shame' Shows Hacks, Vendor Breaches Top List Hacks and vendor incidents continue to dominate major health data breach trends in 2024, but a handful of large incidents involving "unauthorized access or disclosure" also top the list of major health data breaches reported to federal regulators so far this year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Michigan Medicine data breach impacted 56953 patients

Security Affairs

The academic medical center of the University of Michigan, Michigan Medicine, suffered a data breach that impacted 56953 patients. Michigan Medicine notified patients of the data breach. ” reads the data breach notification published by the organization.

article thumbnail

Court Orders Optus to Release Data Breach Report to Lawyers

Data Breach Today

Class Action Law Firms Seek Access to Commissioned Deloitte Report Into Mega-Breach The Federal Court of Australia has rejected a request from telecommunications giant Optus to keep private a detailed digital forensic investigation report conducted by Deloitte into the massive data breach it suffered in 2022, exposing private information pertaining (..)

article thumbnail

Ransomware Prevention and Recovery

Learn how to protect your business data from the most disruptive malware currently in existence. This whitepaper will help you avoid becoming the victim of a data breach and ensure business continuity. It discusses defense best practices and protection solutions to help you keep your data safe.

article thumbnail

Weasel Words Rule Too Many Data Breach Notifications

Data Breach Today

The Security of Our Customers' Data Is Our Top Priority' - Really? Does a day ever go by without a fresh set of data breach notifications? Some organizations' breach notifications at least signal respect for the recipient.

article thumbnail

FTC Expands Financial Data Breach Reporting Requirements

Data Breach Today

Non-Banking Institutions Will Be Required to Report Breaches Under Revised Rule. Consumer lenders such as mortgage brokers, auto dealers and payday lenders must soon report data breaches to the Federal Trade Commission under a revised regulation that mandates public disclosure.

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” IBM reported that the total damage from data breaches in 2021 was 4.24M USD (up from 3.86M USD in 2020), easily the highest aggregated amount on record.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. Software is complex, which makes threats to the software supply chain more real every day. In the U.S. alone, cyber losses totaled $10.3 billion in 2022.

article thumbnail

How to Effectively Equip Your IG Program for the Perilous Journey Into the Future

Speaker: Andrew Ysasi, Vice President of Advocacy for Vital Records Control, President of IG GURU®, MS, FIP, FIIM, CIPM, CIGO, CISM, PMP, CRM, IGP, CIP, CSAP

An information governance framework shows how an organization manages specific data, like personal information, as well as how this information is stored. Over the past couple of years, these frameworks have proven to be ineffective and in need of updating.