DHS: Cyberattacks against manufacturing, utilities are getting worse | Health-related apps can fall under privacy rules, attorney says | Public USBs convenient but also potentially dangerous
Created for {EMAIL} | [Web Version]
June 2, 2016
[Â]
[Data Security & Privacy SmartBrief]
[SIGN UP] ⋅ [FORWARD] ⋅ [ARCHIVE]
Top Story
[DHS: Cyberattacks against manufacturing, utilities are getting worse]
[The Homeland Security logo is seen Augus]
(Paul J. Richards/AFP/Getty Images)
The Department of Homeland Security says enemy cyberattacks on American manufacturing and utility control systems are rising. The threat will only escalate over time, experts say.
[Business Insider] (5/26)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Data Security & Privacy
[Health-related apps can fall under privacy rules, attorney says]
Health and wellness apps marketed directly to consumers do not fall under Health Insurance Portability and Accountability Act privacy rules, but apps linked to a health plan or health care provider may be covered, says Fenwick & West attorney Stefano Quintini. Determining if an app falls under HIPAA can depend on whether a company offers it as part of its employer-sponsored benefits or as a wellness benefit available to all employees, Quintini says.
[Employee Benefit News] (5/26)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Public USBs convenient but also potentially dangerous]
[2013 Consumer Electronics Show Highlights Newest Technology]
(David Becker/Getty Images)
Public USB ports are convenient for charging mobile devices, but not all of them are safe as they can be used to steal files and install malware. Kaspersky Lab spells out the hazard, which can affect devices that are locked.
[The Sydney Morning Herald (Australia)] (6/1)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [How to minimize cybersecurity risk] Entrepreneur online (5/31)
Cyber Risk
[Report: Organizations fail to address social media cyberrisk]
Failing to create strong policy regarding social media use or to properly archive such communication increases cyberrisk, according to a report from Osterman Research. Most organizations do not rely on purpose-built solutions to monitor and defend against cyberattacks that come via social media.
[Smarsh] (5/11)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
By the Numbers
[Report shows education near the top in cybersecurity incidents]
Education is tied with business for the second-most-breached subsector, with 6.6% of all reported cybersecurity incidents in 2015, according to Symantec's 2016 Internet Security Threat Report. This article features a video and other resources higher-education technology professionals can use to help beef up security.
[EdTech magazine online] (5/27)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Practice & Policy
[Experts offer insights on how CIOs, CISOs could bolster cybersecurity investment]
Health care CIOs and CISOs could effectively convince C-suite executives to boost cybersecurity investment by focusing on the needs of the business and pitching innovative measures against cyberattacks, experts said. They should also ensure that basic measures such as encryption of medical devices are done properly. "It's no good trying to protect against an advanced threat if you don't have a good foundation," said Texas Children's Hospital CISO Sanjeev Sah.
[Healthcare IT News] (6/1)
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
- [Judge: Banks' lawsuit against Home Depot can advance to court] BankInfoSecurity.com (6/1)
AllClear ID News
4 steps to respond more effectively after a data breach
The most thorough preparation pre-breach won't matter if your response team is derailed by emotions like denial, tunnel-vision and anger. [Download this whitepaper], Factoring the Human Element Into Your Data Breach Response, to learn which emotions are most likely to derail your team and steps you can take now to be ready to address them during a crisis.
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Is your team ready for a data breach?
As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, customer-focused response. Consumers, regulators and the media want a well-orchestrated response launched just days after a data breach, and preparation in advance is critical to success. [Download this Incident Response Workbook] and learn:
- Key considerations for data breach preparation and customer notification
- Best practices for the customer-facing aspects of data breach response
- Recommendations for planning and executing a well-orchestrated response
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
Learn more about AllClear ID: [About AllClear ID] | [AllClear ID Breach Response]
[AllClear ID Resources]
You don't always win, but every time you lose, you get better.
Ian Somerhalder,
actor
[LinkedIn] [Twitter] [Facebook] [Google+] [Email]
[Sign Up]
[SmartBrief offers 200+ newsletters]
Subscriber Tools:
[Manage Subscriptions]
[Update Your Profile]
[Unsubscribe]
[Send Feedback]
[Archive]
[Search]
Contact Us:
Editor - [Amanda Gutshall]
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2016 SmartBrief, Inc.®
[Privacy policy] | [Legal Information]
Â