Remove 2014 Remove Insurance Remove Security Remove Strategy
article thumbnail

Anthem Cyberattack Indictment Provides Defense Lessons

Data Breach Today

Security Experts Say Prosecution's Document Offers Critical Cybersecurity Insights The indictment of two Chinese men for a 2014 cyberattack on health insurer Anthem that compromised information on nearly 80 million individuals contains extensive details about the incident that security professionals can use to help with their breach prevention strategies. (..)

Insurance 189
article thumbnail

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs on Security

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. Alex Holden is founder of Hold Security , a Milwaukee-based cybersecurity firm. “ Cl0p ” a.k.a. Encrypting sensitive data wherever possible.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. What drew you to this field? Byron: It’s an important risk management tool.

article thumbnail

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance

AIIM

Hence the concept of electronic identification and trust services ( eIDAS ) as defined in EU regulation 910/2014 is centered around trust and security and certificate-based signing. Allianz – a global financial services and insurance company – is one of those organizations which had to rethink their approach on e-signatures.

article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk Episode 159: Deep Fakes and Election (in)Security with ZeroFOX. For our new ebook: Rethinking Third Party Cyber Risk Management, Security Ledger interviewed IT risk professionals across industries. Read the whole entry. »

Risk 40
article thumbnail

New York Banking Regulator Announces New Cybersecurity Assessment Process

Hunton Privacy

On December 10, 2014, the New York State Department of Financial Services (the “Department”) announced that it issued an industry guidance letter to all Department-regulated banking institutions that formally introduces the Department’s new cybersecurity preparedness assessment process.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

The plan was to meet the insurance coordinator at the Howard Avenue office at 8:30 a.m. I was aware that I would need documentation on damage and losses for insurance and internal purposes. The archivist and I met the insurance coordinator and the disaster response contractor at the site to do a walk-through and assess the damage.