article thumbnail

New Hampshire Governor Signs Insurance Data Security Law

Hunton Privacy

On August 2, 2019, New Hampshire Governor Chris Sununu signed into law SB 194 (the “Bill”), which requires insurers licensed in the state (“licensees”) to put in place data security programs and report cybersecurity events. The state insurance commissioner may take “necessary or appropriate” action to enforce the new law.

article thumbnail

NYDFS Imposes Fine of $5 Million on Carnival for Cybersecurity Breaches

Hunton Privacy

(“Carnival”), the world’s largest cruise-ship operator, for violations of the Cybersecurity Regulation (23 NYCRR Part 500) in connection with four cybersecurity events between 2019 and 2021, including two ransomware events. . NYDFS also found that Carnival had failed to implement basic protocols to prevent data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

E-Verify’s “SSN Lock” is Nothing of the Sort

Krebs on Security

A reader who was recently the victim of unemployment insurance fraud said he was told he should create an account at the Department of Homeland Security ‘s myE-Verify website , and place a lock on his Social Security number (SSN) to minimize the chances that ID thieves might abuse his identity for employment fraud in the future.

Passwords 289
article thumbnail

Top 5 Cyber Security Risks for Businesses

IT Governance

This is a security mechanism that requires people to enter a second piece of information in addition to a password in order to log on. Weak passwords. For all the advancements that organisations have made to secure their systems, password practices remain a huge problem. Passwords are usually compromised in one of two ways.

Risk 144
article thumbnail

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs on Security

The CLOP members said one tried-and-true method of infecting healthcare providers involved gathering healthcare insurance and payment data to use in submitting requests for a remote consultation on a patient who has cirrhosis of the liver. Encrypting sensitive data wherever possible. ”

article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

credit or debit card number, or any financial account number in combination with any required security code, access code or password that would permit access to such financial account. In the event that individuals are identified after 60-days, they must be notified as “expediently as possible.”. 60-Day Notification Window.

article thumbnail

Ukraine Crisis – Heightened Cyber Threat – Be Prepared

DLA Piper Privacy Matters

The following considerations should help to harden your organisation’s posture and reduce the impact of a cyber event: Review and share your Incident Response Plan, Crisis Management Plan and Business Continuity and DR plans with key team members and make sure they address all current threats. Check your cyber insurance policy.