Remove Energy and Utilities Remove Government Remove Insurance Remove Security

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Security Affairs

Nigerian cyber gang SilverTerrier, specialized in BEC attacks, used COVID-19 lures in recent attacks on healthcare and government organizations. Please vote Security Affairs for European Cybersecurity Blogger Awards – VOTE FOR YOUR WINNERS [link].

Business ID Theft Soars Amid COVID Closures

Krebs on Security

based cyber intelligence firm Hold Security has been monitoring the communications between and among a businesses ID theft gang apparently operating in Georgia and Florida but targeting businesses throughout the United States.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. unknown) Criminal hackers attack Ehrmann, demand millions in ransom (unknown) Criminal hackers attack Energy Hamburg Radio (unknown) Chemical distribution company Brenntag paid a $4.4

GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige

The Last Watchdog

The Health Insurance Portability and Accountability Act — HIPAA — has undergone some massive changes in the past few years to minimize the burden of healthcare entities. Meanwhile, the healthcare sector accounted for 79 percent of all reported data breaches during the first 10 months of 2020, a study by Fortified Health Security tells us. Last year, the government saw that even the most security-conscious organizations could not prevent cyber attacks.

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cyberspace Administration of China will work together with relevant government agencies to formulate materials for the identification of “key information infrastructure” in their respective industry sectors and fields.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

We logged 134 security incidents in December, which accounted for 148,354,955 breached records. The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog.

The Internet of Things (IoT): Managing the Data Tsunami

Collibra

Yet along that path there will be numerous obstacles to overcome – chiefly related to data privacy and governance. The Internet-of-Things has the potential to transform a range of industries – from automotive and agriculture through to healthcare, home appliances and insurance services. But exactly how that data is utilized (and potentially monetised) will differ across sectors. Data governance holds the key. How it is secured.