Update: On December 2, Sunshine Behavioral Health reported this incident to HHS as impacting 3500 patients. They also ticked the box for Business Associate. Update 2: On January 23, 2020, ID Experts submitted a copy of their notification to patients to the Vermont Attorney General’s Office. Another day, another leak. In this case, an error…
Category: Commentaries and Analyses
Indian education institutions hit hard by hackers: Report
IANS reports: Education domain is one of the most “at-risk” industries in India, with the sector accounting for more than 30 per cent of cyber threats targeting enterprises in the country between July and September 2019, a new report from Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, said on Wednesday. Other…
Utah Company Settles FTC Allegations it Failed to Safeguard Consumer Data
The FTC announced a settlement in a data security enforcement action against InfoTrax Systems, L.C. and its former CEO, Mark Rawlins. Here is their press release, below, followed by InfoTrax’s comments on the settlement: A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the…
Gaping ‘hole’ in Qualcomm’s Secure World mobile vault leaked sensitive data
Charlie Osborne reports: A severe “hole” in the Qualcomm Secure World virtual processor, now patched, has been disclosed by researchers. According to cybersecurity researchers from Check Point, the Secure World safe compartment — used to house sensitive data in our mobile devices — could be exploited to leak financial information. Read more on ZDNet.
Pangilinan raises anew risks of espionage, breach of data privacy on entry of China-owned telco
Mario Casayuran reports: Minority Senator Francis N. Pangilinan raised on Wednesday espionage and data privacy questions on the entry of third telecommunications company (telco), Dito Telecommunity Corporation, a consortium which includes a China-owned company, into the Philippine communications industry after it was a given a tentative agreement to install towers inside Philippine military camps. Read…
Analyzing Careless Users, An Often Overlooked Threat
Many have written about how to mitigate the risks posed by malicious insiders. But what about the vulnerabilities associated with Careless Users? What actions can healthcare organizations take to better prevent a breach caused by internal negligence? The Clearwater CyberIntelligence® Institute analyzed the Critical and High risks found in Clearwater’s IRM|Analysis™ database, specifically focusing on…