Apr 17
Florida-based Memorial Healthcare System is notifying nearly 9,500 patients that a recent data breach might have exposed their personal information.
http://www.ihealthbeat.org/articles/2012/4/16/florida-health-system-notifies-...
Apr 11
Utah Department of Technology Services (DTS) reveals 780,000 individuals have been affected by the theft of sensitive Medicaid information. That's far worse than initial estimates.
http://www.informationweek.com/news/healthcare/security-privacy/232900128
Apr 5
A company that processes credit card transactions said Monday that as many as 1.5 million card numbers were compromised in a data breach early last month. The CEO of the company, Global Payments Inc., said the matter was "absolutely contained," but Visa dropped the company from its list of approved third parties that process transactions between stores and banks.
http://www.businessweek.com/ap/2012-04/D9TT0GUG0.htm
Mar 29
Hacktivism is a growing concern among the data security community. This group of criminals is responsible for a great deal of security breaches; however they are not the cause of the majority of data breach incidences. This Infographic illustrates the worst Data hacks of 2011, with details of method, lost information, and cost of damage control.
http://www.webpronews.com/infographic-2011s-worst-hacking-scandals-2012-03
Mar 22
Released today, Fellowes' Workplace Data Security Report found that 81 percent of office employees have access to paper documents containing sensitive workplace information, yet only 62 percent cite their company as having a data security policy on which employees are trained. Some of those untrained employees may be leaving their companies vulnerable to a security breach, as the survey also reports that nearly a quarter of employees leave sensitive paper documents on top of their desks.
http://www.marketwatch.com/story/national-survey-uncovers-data-breach-vulnera...
Mar 12
As workers increasingly use personal or company-owned consumer technology on the job, IT managers face an ever-growing challenge; maintaining control of corporate data as hundreds or thousands of new devices are added to their technology stables. The use of tablet computers and smartphones, along with social networks and free online services, in the workplace is pressuring IT executives to rethink their game.
http://www.computerworld.com/s/article/9225049/IT_Faces_Up_to_Mobile_Device_Test?taxonomyId=154
Mar 5
Eleven class-action lawsuits filed against Sutter Health over a data breach are being consolidated into a single case in Sacramento County Superior Court. The cases are being consolidated to maximize resources and avoid duplication.
The data breach occurred the weekend of Oct. 15, 2011, after a computer was stolen from the Sutter Medical Foundation business office in Sacramento.
The learn more about this story, visit the full article here.
Feb 28
Companies that provide “personal information” regarding Massachusetts residents in electronic or written form to a service provider will need to make sure that their service contracts require the service provider to use appropriate security measures to protect the information.
http://www.lexology.com/library/detail.aspx?g=21e6c40e-1a3e-46f3-bacb-1d6f755d76da
Feb 20
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Helping us out are security practitioners from a variety of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.
http://www.cio.com/article/700413/The_15_Worst_Data_Security_Breaches_of_the_21st_Century
Feb 13
From compromised machines to mass email lists for spamming, electronically-transferring funds out of bank accounts to phishing attacks—India’s 100 million internet users have become prime targets for hackers across the globe.
http://www.business-standard.com/india/news/cyber-crime-is-nowbooming-industry/462549/