Advertisement
 
Data Backup
Subscribe to Data Backup

The Lead

New Cyber Security Bill Could be Coming Soon

March 25, 2015 4:21 pm | by Ken Dilanian, Associated Press | News | Comments

House intelligence committee leaders unveiled a bipartisan cyber security bill  amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

Washington Announces Investigation Into Premera Cyber Attack

March 25, 2015 2:51 pm | by Derrick Nunnally, Associated Press | News | Comments

Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and...

Hacker Must Disclose Assets to Federal Judge

March 23, 2015 10:19 am | by Martha Bellisle, Associated Press | News | Comments

A Russian man charged with hacking into U.S. businesses to steal thousands of credit card...

Social Security Data Error Raises Red Flags

March 16, 2015 3:36 pm | by Stephen Ohlemacher, Associated Press | News | Comments

Americans are getting older, but not this old: Social Security records show that 6.5 million...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Dutch Judge Scraps Data Retention Law

March 12, 2015 10:59 am | by Associated Press | News | Comments

 A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users.  The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.

Journalist Once Again Targeted by Hackers

March 9, 2015 4:16 pm | News | Comments

Internet watchdog group Citizen Lab said in a report  that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software.  Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.

Air Traffic Control System at Risk of Being Hacked

March 4, 2015 4:16 pm | by Joan Lowy, Associated Press | News | Comments

The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.

Advertisement

Getting Hacked Could Have Legal Repercussions

February 17, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.

Can You Trust Your Public Cloud?

February 12, 2015 11:11 am | by Bill Highleyman, Managing Editor, Availability Digest | Blogs | Comments

Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,

New Agency Would Coordinate U.S. Cyber Threat Intelligence

February 12, 2015 10:28 am | by Ken Dilanian, Associated Press | News | Comments

The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government.  Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.

Cloud Risk – Chance of Showers

February 10, 2015 11:41 am | by Pete O'Dell | Articles | Comments

Cloud computing is an increasingly important IT option for organizations of all sizes.  There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture

Health Care Records a Prime Target for Hackers

February 9, 2015 4:09 pm | by Tom Murphy and Brandon Bailey, Associated Press | News | Comments

Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands.  Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information. 

Advertisement

Sony Says it Will Not Suffer Significant Long Term Damage from Hack

February 5, 2015 10:51 am | by Elaine Kurtenbach, Associated Press | News | Comments

Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.

Dutch Judge Approves Extradition Request for Russian Hacker

January 29, 2015 10:56 am | by Mike Corder, Associated Press | News | Comments

The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.

Maryland Man Pleads Guilty to Targeting Army, Microsoft

January 21, 2015 3:55 pm | by Associated Press | News | Comments

Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers.  Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty  to conspiracy to commit computer intrusions and criminal copyright infringement.

Kenya Could Send Hackers Back to China

January 21, 2015 3:48 pm | by Associated Press | News | Comments

 A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking.  Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.

Some of Obama's Cyber Threat Plans are Similar to Previous Legislation

January 16, 2015 10:57 am | by Associated Press | News | Comments

President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.  Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns. 

Advertisement

Russian Hacker Fighting Extradition to the U.S.

January 16, 2015 10:30 am | by Mike Corder, Associated Press | News | Comments

The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge  to ban his extradition to the United States.  U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.

Could New Cyber Security Regulations be On the Way?

January 13, 2015 11:07 am | by Joe Shust, Editor | Blogs | Comments

In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act.  The act would also make it a crime to sell customers’ identities overseas. 

New Legislation Could Require Companies to Inform Customers of Hack Within 30 Days

January 13, 2015 10:10 am | by Associated Press | News | Comments

 President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.

Speaker's Soapbox: Lori Cunningham of Aetna

January 2, 2015 11:28 am | by Associated Press | Articles | Comments

Lori Cunningham, Lead IT Service Management Specialist for Aetna, will present "From Checking-the-Box to Truly Resilient: Case Studies in Disaster Recovery."  She will focus on public and private sector case studies that show why having a strong disaster recovery program is important for any organization. 

Business Continuity and the Sony Data Breach: Part 1

December 23, 2014 11:48 am | by Joe Shust, Editor | Articles | Comments

A massive data breach at Sony Pictures Entertainment, which experts believe was targeted by North Korea as retaliation for a film depicting the assassination of its leader Kim Jong Un, has led to an international incident that has gained the attention of business continuity professionals.

South Korea Power Company Preparing for Cyber Attacks

December 23, 2014 11:32 am | by Associated Press | News | Comments

South Korea's monopoly nuclear power company said it began drills against possible cyberattacks after online threats of attack against its plants.  State-owned Korea Hydro & Nuclear Power Co. said the two-day drills are meant to prepare workers in the event of hacking attacks aimed at disabling the plants' controlling systems.

Officials Calling Sony Hack 'Most Damaging Ever'

December 19, 2014 8:21 am | by Associated Press | News | Comments

The unprecedented hack of Sony Pictures which a U.S. official says is linked to North Korea may be the most damaging cyberattack ever inflicted on an American business.  The fallout from the hack that exposed a trove of sensitive documents, and this week escalated to threats of terrorism, forced Sony to cancel release of the North Korean spoof movie "The Interview."

Businesses, Individuals Can Take Precautions Against Identity Theft

December 16, 2014 9:33 am | by Associated Press | News | Comments

Criminals stole personal information from tens of millions of Americans in data breaches this past year. Of those affected, one in three may become victims of identity theft.  Americans are mostly at the mercy of companies to keep their sensitive details safe. But there are steps businesses and individuals can take to protect themselves against the financial, legal and emotional impact of identity theft — and most of them are free.

Researchers Still Searching for Identity of Hackers

December 11, 2014 4:04 pm | by Associated Press | News | Comments

Researchers say they have a wealth of clues — but no clear answers — as to the identity of those behind a series of newly discovered cyberattacks targeting Russian and Eastern European embassies, oil companies and military officers.   The malware — nicknamed "Inception" — has been attacking mainly Russian or Eastern European targets in the fields of diplomacy, energy and finance.

North Korea Denies Role in Sony Hack

December 8, 2014 3:09 pm | by Associated Press | News | Comments

North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures, which is producing an upcoming film that depicts an assassination plot against Pyongyang's supreme leader.  Some cybersecurity experts say they've found striking similarities between the code used in the hack of Sony Pictures Entertainment and attacks blamed on North Korea that targeted South Korean companies and government agencies last year.

Video: The Resilient Technology Collaborative

December 5, 2014 11:32 am | by CI Staff | Videos | Comments

Fred Bowne, Managing Principal at Aristata and and Director of the Resilient Technology Collaborative, discusses the goals of the RTC and how they hope to help business continuity professionals solve shared tech challenges from across the industry.

Experts Say It is 'Unlikely' That North Korea Perpetrated Sony Hack

December 5, 2014 10:12 am | by Associated Press | News | Comments

Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online.  Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading