Does the HIPAA Breach Notification Rule apply to all Covered Entities and Business Associates, Even Smaller Ones? To many of you reading this post this question seems ridiculous. You know the answer. However, I get asked this question so frequently that I decided to answer it with a blog post to save time next time…
Tag: phishing
WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
Business Email Compromise Explained in Less than 4 Minutes (Video)
Here is a nice video from Trend Micro that provides a good overview of what is often referred to as the business email compromise:
Happy Data Privacy Day!
WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future…
How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)
WFAA TV’s Jane McGarry interviewed Shawn Tuma on the Good Morning Texas show to discuss how you can protect yourself from cell phone cyber threats and identity theft (Jan. 18, 2017) (WFAA LINK).
Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise
A warning for law firms: Preet Bharara, the U.S. Attorney for the Southern District of New York, said the case should serve as a “wake-up call for law firms around the world.” “You are and will be targets of cyber hacking, because you have information valuable to would-be criminals,” Bharara said in a statement. But…
You must be logged in to post a comment.