French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ TB of confidential data

Security Affairs

The CyberNews investigation team discovered French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ TB of confidential data. The archives include product data like product quantities and IDs, as well as warehouse data.

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

The majority of those came from a credential-stuffing attack targeting Spotify and a data leak at the messaging app GO SMS Pro, which you can learn more about below. Here is our complete list of November’s cyber attacks and data breaches. Data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

List of data breaches and cyber attacks in October 2020 – 18.4 million records breached

IT Governance

The good news is that those data breaches and cyber attacks accounted for just 18,407,479 breached records. With that in mind, here is our complete list of October’s cyber attacks and data breaches. Data breaches. Data breaches.

Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts

Threatpost

Breach Cloud Security Privacy advil call transcripts cancer drugs chantix Customer Data Customer Records data breach data leak drug company exposure google cloud lyrica misconfiguration open database patient information Pfizer pharmaceuticals premarin prescriptions Viagra vpnMentor

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

There were a massive 99 data breaches and cyber attacks in August, making it the third-biggest monthly total of the year by number of security incidents. Data breaches. The post List of data breaches and cyber attacks in August 2020 – 36.6

Data breaches: the financial cost of poor planning

IT Governance

Data breaches can have a wide-reaching impact. Not only can a data breach affect your organisation’s ability to fulfil its business objectives for at least a little while, but there is a significant financial cost associated with a breach of data, whether malicious or accidental. Ponemon Institute’s 2018 Cost of a Data Breach Study considers the financial impact associated with a breach.

Alleged docs relating to Covid-19 vaccine leaked in darkweb

Security Affairs

While the pandemic is spreading on a global scale, threat actors continue to target government organizations and entities in the pharmaceutical industry. The links to the documents have been shared by a newly created profile which was used only for the alleged data leak.

List of data breaches and cyber attacks in January 2020 – 1.5 billion records breached

IT Governance

By comparison, 2019 saw an average of almost 80 data breaches and cyber attacks per month. Several major incidents occurred in January, boosting the total number of breached records to a substantial 1,505,372,820. SuperCasino breached, with users’ personal info stolen (unknown).

Digging the recently leaked Chinese Communist Party database

Security Affairs

KELA researchers analyzed a database recently leaked online that contains data for 1.9 The database was extracted from a server on April 16, 2016 by a local dissident, then a second source, dubbed “the Data Cleaner” uploaded it to activists’ private chat rooms.

Security Affairs newsletter Round 292

Security Affairs

Breaking News Hacking data breach hacking news information security news IT Information Security malware Pierluigi Paganini Security Affairs Security NewsA new round of the weekly SecurityAffairs newsletter arrived!

The hidden threats facing your intellectual property

IT Governance

When we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation. For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. The range of threats that organisations face make it impossible to eliminate the risk of a breach.

68% of Pharma Executives Have Had Credentials Breached Online

Adam Levin

The online credentials for 68% of pharmaceutical executives analyzed for a study have been compromised recently. C-suite executives have been a frequent target for hackers and scammers, but Pierson identified some vulnerabilities specific to the pharmaceutical industry. “In

Privacy and Cybersecurity Top 10 for 2018

Data Matters

This past year was marked by ever more significant data breaches, growing cybersecurity regulatory requirements at the state and federal levels and continued challenges in harmonizing international privacy and cybersecurity regulations. The May 25, 2018 effective date for the EU’s General Data Protection Regulation (GDPR) will no doubt be a central focus of 2018. Data breach litigation risks. Data breach litigation may reach a turning point in 2018.

Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware

Krebs on Security

The reader said the apparent culprit was the Snake ransomware , a relatively new strain first detailed earlier this year that is being used to shake down large businesses, holding their IT systems and data hostage in exchange for payment in a digital currency such as bitcoin.

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

California law also requires businesses that suffer a breach of security to disclose the breach to consumers, and in some instances law enforcement, if sensitive information is compromised. In the aftermath of the Cambridge Analytica scandal, and in the footsteps of Europe’s General Data Protection Regulation (“GDPR”), California privacy advocates introduced a ballot initiative on October 12, 2017 called “The Consumer Right to Privacy Act of 2018” (No.

The Applications of Blockchain in Data Management

AIIM

The blocks also contain a timestamp and transactional data. 5 Benefits of Blockchain for Data Management. In my work at Mustard IT , many of our data management projects for our clients have involved the use of blockchain. Data Security. Data Quality. Data Sharing.

Information security and compliance training for the healthcare sector

IT Governance

Healthcare is one of the hardest-hit industries when it comes to data breaches. Healthcare providers (HCPs) and industry partners process significant amounts of data which that is both attractive and valuable to cyber criminals. Pharmacies, rehabilitation care, social care, medical research and pharmaceuticals all rely on this data being available to individuals delivering their services. The GDPR provides a single, harmonised data privacy law for the EU.

New Data Protection-Friendly eCommercial Model Clinical Trial Agreements Now Available

HL Chronicle of Data Protection

Given the increasing importance of safe but swift clinical trials in the time of coronavirus, this post outlines the main changes introduced from a data protection perspective and what they mean for contracting parties. With respect to the data sharing under Clause 6.3,

Security in a World of Physically Capable Computers

Schneier on Security

The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. We have accepted this tenuous situation because, for a very long time, computer security has mostly been about data. Banking data stored by financial institutions might be important, but nobody dies when it's stolen. Facebook account data might be important, but again, nobody dies when it's stolen.

CNIL Unveils 2017 Inspection Program and 2016 Annual Activity Report

Hunton Privacy

On March 28, 2017, the French Data Protection Authority (“CNIL”) published its Annual Activity Report for 2016 (the “Report”) and released its annual inspection program for 2017. The CNIL estimates that the GDPR will lead to the appointment of a data protection officer in at least 80,000 to 100,000 organizations in France. European Union International CNIL Consent Data Protection Authority EU Regulation France Internet Legislation Personal Data Right to Be Forgotten

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. As part of a company’s assessment, identify what types of personal information the company collects and the different manners in which it maintains the data. Is the data PHI? This data may not be eligible for the CCPA exemption.

CIPL and AvePoint Release Global GDPR Readiness Report

Hunton Privacy

On November 9, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP and AvePoint released the results of a joint global survey launched in May 2016 concerning organizational preparedness for implementing the EU General Data Protection Regulation (“GDPR”). Telecommunication and technology companies were the most represented respondents, followed by insurance and financial services companies, as well as pharmaceutical and healthcare companies.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. As part of a company’s assessment, identify what types of personal information the company collects and the different manners in which it maintains the data. Is the data PHI? This data may not be eligible for the CCPA exemption.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Determine what data is covered by the CCPA. However, even organizations that do not qualify as a “business” may nonetheless need to evaluate their data sharing arrangements and partnerships with CCPA-covered entities. As part of a company’s assessment, identify what types of personal information the company collects and the different manners in which it maintains the data. Is the data PHI? This data may not be eligible for the CCPA exemption.

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. Among other news: B&Q breached the personal data of 70,000 people who had been caught stealing products from its stores.

July 9 – 13, 2019

InfoGovNuggets

“ Schools Wrestle With Privacy of Digital Data Collected on Students ,” The Wall Street Journal , July 11, 2019 (online). Who owns the data, and what rules govern? “ Marriott Faces $124 Million Fine Over Starwood Data Breach ,” The Wall Street Journal , July 10, 2019 (online). District Court judge says Health and Human Services didn’t have the authority to require pharmaceutical companies to publish these prices.

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

On May 28, 2019, the Cyberspace Administration of China (“ CAC “) released the draft Measures on the Administration of Data Security (“ Data Security Measures ” see our in-house English translation here ) for public consultation. The scope of application of the Data Security Measures. The data covered by the Data Security Measures includes personal data and important data. Filing of personal data collection statements.