I.T., Blog, Social Media Deidre Frith I.T., Blog, Social Media Deidre Frith

IT Breaches for July 2020

This month, healthcare data breaches keep climbing, Twitter apologizes for its breach and more. Read some of the incidents in the articles below:

CYBERSECURITY NEWS

Social Media, Healthcare and Higher Education struggle in cybersecurity

This month, healthcare data breaches keep climbing, Twitter apologizes for its breach and more. Read some of the incidents in the articles below:


Twitter-615x445.jpg

Industry: Social Media

Exploit: Accidental Data Sharing

Twitter sent a notification to business clients last week acknowledging a data breach that exposed the personal and billing information of some users. The breach occurred due to an issue that led to some users’ sensitive information being stored in the browser’s cache. Twitter explained that it recently became aware of this issue. Business users were warned that prior to May 20, 2020, if you viewed your billing information on ads.twitter or analytics.twitter your account’s billing information may be at risk.

Twitter did not release an estimate of the accounts affected, but it did specify that only business customers were at risk, and only a percentage of business customers had any details exposed. The leaked information potentially included email addresses, users’ contact numbers, and the last four digits of credit card numbers used for Ads accounts. Twitter business customers should monitor potentially affected payment accounts.


76ad-article-200624-amt-body-text.jpg
 

Industry: Healthcare

Exploit: Internal Email Account Compromise

AMT Healthcare revealed this week that it had experienced a data breach affecting a large pool of customers in December 2019 that was discovered through suspicious activity on an employee email account. The California-based company recently completed an investigation into the incident and contacted those who were affected. Potentially compromised data includes patient names, Social Security numbers, medical record numbers, diagnosis information, health insurance policy information, medical history information, and driver’s license/state identification numbers.

Anyone that may be at risk of compromise was informed this week. Extremely sensitive data was compromised in this breach, and those affected should beware of the potential for fraud, identity theft, and spear phishing attempts that this stolen data creates. A filing of the account posted to the breach portal at the U.S. Department of Health and Human Services noted that potentially affected patients are being offered free credit monitoring services. 

When clients choose to do sensitive business with a company, they’re also trusting that company to guard their information. This imperative is even stronger for companies that collect health information. Not only does a data breach cost healthcare organizations patient confidence, but it also costs a fortune in HIPPA-related fines. 


Screen Shot 2020-07-01 at 5.18.06 PM.png
 

Industry: Higher Education

Exploit: Ransomware

The University of California San Francisco (UCSF) confirmed this week that it paid cybercriminals $1.14 million to decrypt data following a ransomware attack. Although UCSF was able to detect the incident quickly, it was not fast enough to allow cybersecurity teams to quarantine the affected servers, and a significant portion of its medical school and research data was encrypted. The ransom was demanded to free essential COVID-19 research data that was captured in an intrusion on June 1. Reports indicate that UCSF was one of four academic institutions targeted in a single week by the Netwalker ransomware group.  

Ransomware is a growing menace to every organization, and it’s not just sensitive business or financial data that Dark Web criminals are after. Research data has become an increasingly hot commodity. Paying ransoms to cybercriminals to decrypt research data sets a dangerous precedent. Collecting large sums will embolden other groups that can take down big fish to score big paydays.  




Read More
Deidre Frith Deidre Frith

IT Breaches

Ransomware disrupts remote work, accidental data sharing compromises customer data, and cybersecurity events reach an all-time high. Read some of the incidents in the egg industry, legal as well as higher education.

RANSOMWARE ATTACKS

AGRICULTURE, LEGAL, AND higher EDUCATION SUFFER ATTACKS

This month, ransomware disrupts remote work, accidental data sharing compromises customer data, and cybersecurity events reach an all-time high. Read some of the incidents in the articles below:


Industry: Eggs

Exploit: Ransomware
Cybercriminals have targeted a vulnerable food supplier with ransomware that encrypted files and exfiltrated data. In addition to product-related information, cybercriminals also obtained personal data on current and former employees. Now, the company faces an arduous recovery process that will involve resuscitating its reputation as it grapples with the high cybersecurity costs associated with ransomware attacks.  
Read Now


Industry: Law Firm/Legal

Exploit: Ransomware
The law firm lost 756GB of client data in the attack. Cybercriminals are threatening to release the information in nine installments unless the firm pays a ransom, believed to exceed $20 million. This attack reflects a ransomware trend: hackers steal company data and demand payment.
Read Now


Industry: Higher Education

Exploit: Ransomware
A ransomware attack forced the academic institution to take most of its IT infrastructure offline. Consequently, staff can’t access email or the VPN tunnel, which is required for accessing remote services. Now, the university is warning students not to open any email attachments and to limit the usage of Windows-based applications. This disruption is a significant inconvenience for students and staff who are already working remotely because of the COVID-19 pandemic.  
Read Now

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Got Kids?

Do you have a household of kids home for the summer? Here are three STEM resources to help keep them entertained and teach them a little bit about STEM from home.

Three Summer Tech Activities for Kids

Here’s a list of some of our favorite activities to keep young minds active and learning in the computer science field! Just click on the images below and it will take you to different resources to help you keep your young ones engaged all summer.


Free computer science weekly activities that release Mondays — some online, some offline, of varying levels of difficulty. Each activity features a woman in tech who pioneered innovative technology.

Free computer science weekly activities that release Mondays — some online, some offline, of varying levels of difficulty. Each activity features a woman in tech who pioneered innovative technology.


Making paper circuit cards is the perfect union of science, technology, art, and design. For that reason, this activity fits perfectly into any STEAM or STEM curriculum at school, for library events, or just for fun at home. Let kids unleash their c…

Making paper circuit cards is the perfect union of science, technology, art, and design. For that reason, this activity fits perfectly into any STEAM or STEM curriculum at school, for library events, or just for fun at home. Let kids unleash their creativity as they experiment with paper circuit art and create a unique card that really lights up!


These binary coding bracelets said “Kind” and “Superkid,” but you can choose any word you want to celebrate the amazingness of your kids. This activity would also make an amazing first-day-of-school activity to help children start the year on the right foot.

 
Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Dark Web Questions Answered!

Do you have questions about the Dark Web? We have an easy to read FAQ sheet for you to download in this brief blog post.

What is the Dark Web?

You’ve heard of the dark web…but what exactly is it? Here are some FAQs courtesy of DARKWEB ID.

The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

Free download

Download the free DARKWEB FAQ sheet now!

Download a free FAQ sheet that explains how to protect yourself, what it means if your organization’s credentials have been exposed and much more…


Information courtesy of DarkWeb ID.

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Free Digital Risk Protection activity Book

This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!

DIGITAL RISK PROTECTION ACTIVITY BOOK

This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!

DOWNLOAD NOW

 
 

This book is courtesy of www.idagent.com.


Read More