Covid Test Data Breach at British School

Covid Test Data Breach at British School

A mix-up at a school in Worcestershire, England, caused parents to receive the Covid-19 test results of other people’s children. The data breach, reported today by the Evesham Journal, occurred at co-educational secondary school and sixth-form college The De Montfort School (TDMS) in Evesham, which is part of the Four Stones Multi Academy Trust. Students returning to learning after the holiday season underwent asymptomatic testing for the coronavirus at TDMS on Tuesday. In a security incident…

Read More

Cyber-Attack on Fertility Centers of Illinois

Cyber-Attack on Fertility Centers of Illinois

A company that operates multiple fertility centers across Northern Illinois has suffered a data breach because of a cyber-attack. Fertility Centers of Illinois (FCI) reported the data breach to the Department of Health and Human Services’ Office for Civil Rights (OCR) as affecting 79,943 current and former patients. The unidentified attacker had access to some of the patients’ protected health information (PHI) and was also able to access personal data belonging to FCI employees. Third-party computer forensic…

Read More

Investigation Launched into RIPTA Data Breach

Investigation Launched into RIPTA Data Breach

A recently reported data breach impacting the Rhode Island Public Transit Authority (RIPTA) is to be investigated by the state’s attorney general. The protected health information (PHI) of thousands of individuals was involved in the data breach, which occurred when RIPTA was attacked by cyber-criminals last summer.  RIPTA reported the data breach to the Department of Health and Human Services’ Office for Civil Rights (OCR) as affecting 5,015 individuals who are members of the transport authority’s group…

Read More

Half of Your Applications Need Modernizing by the End of 2022. What’s Your Plan?

Half of Your Applications Need Modernizing by the End of 2022. What’s Your Plan?

I was recently reading Stuart Stent’s CIO.com article, “The Crucial Role of Application Management in a Cloud Operating Model,” in which he notes that the “IDC predicts that to gain business agility, enterprises will need to modernize over half of their existing applications by 2022, using turnkey cloud-native development and deployment services.” Organizations are looking for all the advantages of moving both their software development teams and their software products to cloud-based platforms, including:  Lower-cost,…

Read More

3 types of national security risk to monitor

3 types of national security risk to monitor

3 types of national security risk to monitor | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Simon Scully named VP, CISO at Venerable

Simon Scully named VP, CISO at Venerable

Simon Scully named VP, CISO at Venerable | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Hackers exploit Google Docs in new phishing campaign

Hackers exploit Google Docs in new phishing campaign

Attackers are taking advantage of the comment feature in Google Docs to send people emails with malicious links, says Avanan. Image: GrafVishenka, Getty Images/iStockPhotos One of the favorite tactics of cybercriminals is to exploit legitimate products for illegitimate purposes. And the more popular the product, the greater the chances of success. A new report released Thursday by email security provider Avanan looks at a new phishing campaign that abuses a popular feature in Google Docs…

Read More

UK Police Seize £322m of Cryptocurrency in Past Five Years

UK Police Seize £322m of Cryptocurrency in Past Five Years

UK police have seized cryptocurrency worth £322m over the past five years, according to official figures obtained by the New Scientist publication following a freedom of information (FoI) request. The funds were taken during multiple criminal investigations over this period, highlighting how cryptocurrencies are increasingly used in illegal activity. This is primarily due to the challenges law enforcement face in seizing digital currencies compared to cash. One of these is that cryptocurrencies are often protected by strong…

Read More

The Contact Center Ghosts of Past, Present, and Future: Part 3

The Contact Center Ghosts of Past, Present, and Future: Part 3

By Steve Forcum In the final part of this 3-part series we are visited by the Ghost of Contact Centers, Future. It is time to ask ourselves—what actionable insights can be realized and implemented? The potential to deliver a win/win/win for all parties involved is achievable, and the Ghost of Contact Centers Future arrives to remind us of one more improvement to make.  Dickens called Scrooge “a tight-fisted hand at the grindstone” – sound familiar? The…

Read More

The Feeling of Safety

The Feeling of Safety

The internet’s greatest feat? Fundamentally shifting how we live. Once a revelation, it quickly set our long-standing beliefs about how we work, play, and connect into a whole new context.  Today, the shifts come fast. Video meetings once felt alien. Now, they’re part of our routine. We’ve gone from setting doctor’s appointments online to actually seeing the doctor online—and from family visits to seeing everyone in seconds on a screen.   At McAfee, we’ve seen our…

Read More
1 3,265 3,266 3,267 3,268 3,269 3,996