Breach Report 2019 – September

by Sarah Harvey / December 15, 2022

Every month there is headline after headline reporting about a new data breach. Whether it’s a ransomware attack, a negligent employee opening a phishing email, or a state-sponsored attack, millions of individuals are impacted by hackers and security incidents on a regular basis. Let’s take a look at some of the top data breaches that occurred during September and the lessons we can learn from them. Foxit Software What Happened?…

What is the Difference Between Phishing and Spear-Phishing?

by Sarah Harvey / June 14, 2023

Imagine this...Your employee, Kevin, sits down at the office and opens his email inbox. The first message is from the CEO of your company, Chris, with the subject line “Priority Task” The email seems urgent. He opens it quickly and reads his task. Because Kevin wants to quickly complete this task for his employer, he rushes to reply. He follows the instructions he receives in a follow-up email, which leads…

Breach Report 2019 – August

by Sarah Harvey / December 15, 2022

Every month there is headline after headline reporting about new data breaches. Whether it’s a ransomware attack, a negligent employee opening a phishing email, or a state-sponsored attack, millions of individuals are impacted by data breaches and security incidents on a regular basis. Let’s take a look at some of the top data breaches that occurred during August and the lessons we can learn from them. State Farm Data Breach…

Breach Report 2019 – July

by Sarah Harvey / December 15, 2022

Regardless of the size or industry of organizations, every month there is headline after headline reporting about new data breaches. Whether it’s a ransomware attack, a negligent employee opening a phishing email, or a state-sponsored attack, millions of individuals are impacted by data breaches and security incidents on a regular basis. Let’s take a look at some of the top data breaches that occurred during July and the lessons we…

Business Associate Due Diligence: Lessons Learned from AMCA

by Sarah Harvey / December 16, 2022

In most healthcare settings, third parties are relied upon to provide secure offerings to assist covered entities in providing quality, secure healthcare services.  Covered entities ultimately bear the responsibility of validating their third party security standards, however, covered entities often times still fall short in ensuring that business associates guard protected health information (PHI) against advancing cybersecurity threats. In one of the most recent cases, Quest Diagnostics, one of the…