Search
Searching Content indexed under Security by Scott Koller ordered by Published Date Descending.
Links to Result pages
 
1  
 
Title
Country
Organisation
Author
Date
1
Deeper Dive: The Scourge Of O365 Incidents
2018 saw a continuation of companies moving toward cloud-based email systems.
United States
29 Apr 2019
2
Deeper Dive: Minimizing Risk
For organizations of any size, making sense of the constantly evolving cyber risk landscape can seem daunting.
United States
6 Apr 2018
3
Deeper Dive: Incorporating Incident Response Into Disaster Recovery Plans
Incident response and disaster recovery are both essential components of a comprehensive written information security program.
United States
15 May 2017
4
Virginia, Tennessee And New Mexico Are The Latest States To Amend Breach Notification Laws
Breach notification statutes remain one of the most active areas of the law
United States
18 Apr 2017
5
Data Breach Trends — 2016: The Year Of Ransomware
Over the past year, the BakerHostetler Incident Response team has closely monitored data breach trends, and we are confident in concluding that 2016 was the year of ransomware.
United States
9 Jan 2017
6
A Closer Look At The OCR's Guidance On Ransomware
In the wake of several high-profile ransomware infections targeting hospitals and healthcare organizations, the U.S. Department of Health and Human Services OCR has issued guidance on the growing threat of ransomware.
United States
31 Aug 2016
7
A Closer Look At The OCR's Guidance On Ransomware
Ransomware is a type of malware that denies access to systems and data.
United States
25 Aug 2016
8
OCR To Increase Efforts To Investigate Breaches Affecting Fewer Than 500 Individuals
The Department of Health and Human Services Office for Civil Rights (OCR) is the federal agency tasked with investigating data breaches involving protected health information (PHI) under HIPAA.
United States
25 Aug 2016
9
TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key
Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files.
United States
27 May 2016
Links to Result pages
 
1