The late summer breach wasn't discovered until Oct. 10, but the state waited more than two weeks before notifying the public. Gov. Nikki Haley says the state will provide taxpayers with one year of credit monitoring and identity protection.
Top executives must be transparent with their stakeholders when their IT systems get attacked. Otherwise, their enterprises' reputations could be more severely damaged, says IBM Fellow Luba Cherbakov.
When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
The unit of the Department of Health and Human Services that administers the Medicare program isn't consistently complying with the breach notification rule that HHS enforces, a new report shows.
A data breach at Northwest Florida State College has affected nearly 280,000 students and employees, exposing their sensitive information. The incident has led to 50 cases of identity theft, the college reports.
The latest updates to the federal tally of major health information breaches confirm that the loss or theft of unencrypted devices continues to plague the industry. Learn all the latest details.
A former emergency department employee of Florida Hospital Celebration allegedly inappropriately accessed more than 760,000 patient records to find traffic accident victims. Find out the details about his arrest.
A new House bill that would let VA doctors treat veterans across state lines via telemedicine opens up questions about how state privacy laws might apply to physicians in the event of a breach.
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
Two unencrypted USB keys carrying copies of information about voters in Ontario, Canada, are missing, potentially exposing information on between 1.4 million and 2.4 million individuals, according to Elections Ontario officials.
How an organization communicates in the wake of a major breach incident can play an important role in maintaining the organization's reputation and minimizing the financial impact.
But how can your organization avoid mismanaging post-breach communication and potentially wasting millions of dollars?
Join us for...
Is your organization at risk of a hacktivist attack? If so, are you prepared to respond?
The past two years have seen entities such as Sony, the FBI and the Egyptian government fall victim to data leaks, denial of service attacks and plain public embarrassment by hacktivist groups such as Anonymous, LulzSec and...
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.