Lege Trend: Power Grid + Data Security. 5 Rationals. 4 Solutions.

Congress is working to secure the nation’s power grid because the power grid is facing a major cyberattack because:

  • the power ” industry’s digital defenses are dangerously lagging and underfunded
  • energy companies are “scrambling to play catch-up”
  • energy companies  are ” leaving the all-important power grid exposed to hackers”
  • “the industry isn’t fully prepared to stymie sophisticated hackers.”
  • “In 2014, the energy sector was the most targeted of the nation’s critical…

How 1 Health Insurer Responded to a Class Action Data Breach Suit Affecting 80 Million

Anthem Inc. responded to a class action lawsuit concerning a data breach affecting 80 million by focusing on the 1 hot botton issue legislatures and regulators are focusing on:

whether the person whose personal information was hacked suffered any actual damages

Why is this response from Anthem important? Because courts, legislatures, and regulators have come down on all sides of whether actual damages is required in a data breach suit.

Anthem also provided all 80 million customers with 2…

U.S.E.D. Inspector General. Education Data is Not Safe. Activists on the Scene.

When did the Inspector General testify that U.S. Department of Education data is not safe? While testifying at a November 17, 2015 hearing of the House Committee on Oversight and Government Reform

Why is federal education data vulnerable to hackers?

  • lax controls over who can access student data
  • outdated technology
  • inadequate data security

What type of student data does USED keep?

  • 139 million Social Security numbers
  • sensitive financial aid borrower information about students and…

Your car is more vulnerable than your Credit Card Number? Cars Top Security Risk List

McAfee Labs 2016 Threats Predictions puts hacking cars as the top security risk, & here’s why:

Findlaw | Technologist | Car Hacking Tops List of 2016 Cybersecurity Threats

Audit of State Cyber Security Reveals Security Flaws & Recommendations.

California’s state auditor released a report on the California’s technology department that:

  • found 73 of 77 failed to meet state cyber security standards
  • a recently adopted state pilot program to beef up cybersecurity compliance was blasted for taking too long & that compliance verification would take 20 years with existing state resources
  • self certification of agencies lacked enforcement mechanisms

The audit recommends:

  • a mandate that California’s technology department undertake a…

Health Care Data 12 times more Valuable to Hackers than Credit Card Data. 3 Reasons Why. Be Ahead of the Curve.

Security Experts say health care data is 4 to 12 times more valuable than credit card data to hackers. 

Why is health care data so valuable?

  • Health care data sets are “extremely detailed personal information.”
  • Health care data alone allows a hacker to:
    •  Apply for credit cards or loans
    • “Allows a hacker to generate huge sums from fraudulent medical charges,” 
  • Average financial loss for stolen health care data: $13,500 per victim

Health care Informatics | Survey: Majority of…

Trendy Lege & legal Issue: Did the Breach Lead to Harm? How one ALJ Decided.Courts Differ.

Courts and legislatures have differed as to whether a person can bring a lawsuit when their personal data is stolen, but the data has not been used to harm the person.

What happened in this administrative law case? The FTC has been trying to enforce sanctions against a health care company for a data breach.

The FTC legalese is that the health care company’s ” purported failure to institute reasonable data security constituted an unfair trade practice under section 5 of the FTC Act,…

3 New Cyber Security Threats for Financial Types & Everyone

Morgan Stanley’s chief information officer of technology and risk information told the Securities Industry and Financial Markets Association’s annual conference that there are 3 new cyber security threats emerging:

  • ransomware- targets an entity, holds your systems hostage until a ransom is paid
  • malicious insiders- someone with valid apparently credentials that seeks to “expose” the entity
  • destructive malware which hits the energy sector more than financial sectors

Think Advisor | 3…