article thumbnail

Student Sues Whiteworth University for Ransomware Attack

CyberSecurity Insiders

Since a breach of violation was witnessed regarding the Washington Consumer Protection Act, the lawsuit obtained importance and could revolutionize the future course of action taken against all cyber-criminal gangs that spread file-encrypting malware and encrypt the servers until a ransom is paid in cryptocurrency.

article thumbnail

8 Ways to Protect Yourself against Scams on Black Friday and Cyber Monday

Adam Levin

Credit cards come with consumer protections that limit your liability if your card information is stolen. Credit cards offer more protections, and less disruption, for victims of fraud. Keep a close eye on your accounts. This is especially risky if you’re using the same password for your credit card and banking accounts.

Scams 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Privacy Day: Securing your data with a password manager

IT Security Guru

Darren Guccione, CEO and Co-founder of Keeper Security, has offered up some tips to best secure your online accounts and stay safe on the internet. So, how can consumers protect themselves? Avoid using the same password across multiple accounts as well as including any personal information. What is a password manager?

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

Health Insurance Portability and Accountability Act (HIPAA). Maryland Personal Information Protection Act – Security Breach Notification Requirements – Modifications (House Bill 1154). Massachusetts 201 CMR 17 (aka Mass Data Protection Law). 4806 — An Act relative to consumer protection from security breaches.

CSO 128
article thumbnail

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

This effectively leaves victims unable to file reports or get documentation of their stolen identities, which is typically a first step for mitigating damage to credit and financial accounts. . These certificates help verify the identity of the government site and to encrypt communication between agencies and site visitors.

article thumbnail

Zoom Settles with FTC over Allegations of Deceptive Security Practices

Hot for Security

One major allegation brought forth by the FTC is that, since at least 2016, Zoom misled users by claiming it offered ‘end-to-end, 256-bit encryption’ when in fact it provided a lower level of security. My dissenting colleagues note that the recent revelations regarding a rogue Zoom employee in China, who accessed accounts and meetings of U.S.-based

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

are subject to laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (the HITECH Act), as well as regulations such as the Clinical Laboratory Improvements Amendments (CLIA). Financial Data Protection Laws.