Search
Searching Content indexed under Security by Dickinson Wright PLLC ordered by Published Date Descending.
Links to Result pages
 
1  
 
Title
Country
Organisation
Author
Date
1
Understanding The HIPAA Security Rule And Tailoring Policies To Fit Your Business
The HIPAA Security Rule[1] was designed to protect the confidentiality, integrity, and availability of a patient's protected health information (PHI) while allowing flexibility
United States
9 May 2019
2
Cybersecurity Update: First SEC Enforcement Action Involving The Identity Theft Red Flags Rule Results In Settlement
On September 26, 2018, the Securities and Exchange Commission announced that a settlement was reached in its first enforcement action involving the Identity Theft Red Flags Rule (the "Red Flags Rule").
United States
18 Dec 2018
3
United States
29 Oct 2018
4
Launch Of The Criminal Division's In-House Health Care Data Analytics Team
In its "2017 Year in Review", the Fraud Section in the Criminal Division of the US Department of Justice announced the launch of its Health Care Fraud Unit's Data Analytics Team.
United States
29 Mar 2018
5
The Numbers Do Lie: How Thieves Can Steal Your Cell Phone Number And Wreak Havoc On Your Life
If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of authentication has some security drawbacks.
United States
21 Feb 2018
6
The Grey's Anatomy / Allscripts Ransomware Crossover Event: When Scripted TV Becomes Reality, The Script Goes Out The Window
For those familiar with the Shonda Rhimes juggernaut, Grey's Anatomy, it is the story of surgical residents, fellows...
United States
5 Feb 2018
7
More Companies Must Comply With The Gramm-Leach-Bliley Act, But Don't Know It. Are You One Of Them?
When the topic of data privacy and cyber security comes up, most people automatically think of data breaches, especially given the high-profile nature of so many of them
United States
15 Sep 2017
8
Phishing Lures: What To Do If You've Taken The Bait - U.S. Version
Sometimes, it's easy to know you're being phished. There's little chance that a bank administrator in a country you've never heard of really needs your help to get the unclaimed money of a deceased...
United States
11 Jul 2017
9
Phishing Lures: What To Do If You've Taken The Bait.- Canadian Version
Sometimes, it's easy to know you're being phished. There's little chance that a bank administrator in a country you've never heard of really needs your help to get the unclaimed money of a deceased...
Canada
11 Jul 2017
10
Analysis: Cyber-Monitoring: The Next Frontier
Cybersecurity is "hot" and will stay "hot" for corporations, executives, regulators, law enforcement and legislators.
United States
10 Mar 2017
11
Autonomous Vehicles
An estimated 21 million fully and semi-autonomous vehicles will be on the roads by 2035. This expansive new market offers incredible opportunity for both existing automotive suppliers...
United States
22 Dec 2016
Links to Result pages
 
1