Blog
Data Privacy & Cybersecurity Blog Posts From April 2020
-
Blog: Legislative Alert: Washington Expands Definition of Personal Information for Public Agencies
Date: April 22, 2020
Title: Legislative Alert: Washington Expands Definition of Personal Information for Public Agencies
Summary: On March 18, 2020, Washington State Governor Jay Inslee signed into law Senate Bill 6187, which amends the state’s security breach notification statute as applicable to state and local agencies by expanding the definition of “personal information” to include the last four digits of an individual’s Social Security number....
-
Blog: Legislative Alert: D.C. Passes Security Breach Protection Amendment Act, Creating New Notice Requirements and Cybersecurity Safeguards
Date: April 17, 2020
Title: Legislative Alert: D.C. Passes Security Breach Protection Amendment Act, Creating New Notice Requirements and Cybersecurity Safeguards
Summary: On March 26, 2020, District of Columbia Mayor Muriel Bowser signed into law Act 23-268, known as the “Security Breach Protection Amendment Act of 2020.” The Act, which amends section 28 of Chapter 38 of the District of Columbia Code, broadens the existing definition of “personal information,” increases the breach notice contents requirements, provides attorney general notice requirements, and mandates cybersecurity safeguards....
-
Blog: Accounting Firm Vulnerability During Tax Season – Now Extended to July 15
Date: April 16, 2020
Title: Accounting Firm Vulnerability During Tax Season – Now Extended to July 15
Summary: Last month, the IRS extended the usual April 15 tax filing deadline to July 15. While this brings relief to those facing financial hardship due to the COVID-19 pandemic, it also extends the window of opportunity for cybercriminals to attack accounting firms. ...
-
Blog: Remaining Vigilant Against State-Sponsored Cyberattacks
Date: April 15, 2020
Title: Remaining Vigilant Against State-Sponsored Cyberattacks
Summary: State-sponsored cyberattacks have increased in recent years. These attacks, which are supported and funded by foreign governments, typically reflect geopolitical dynamics, with hacking campaigns often emerging following international conflicts. Frequently, the nations responsible for cyberattacks seek to achieve specific goals through their hacking campaigns. Their objectives may include conducting economic espionage or disrupting another nation’s political or economic stability....
-
Blog: How to Protect Yourself from Zoom-Hijacking
Date: April 09, 2020
Title: How to Protect Yourself from Zoom-Hijacking
Summary: On March 30, 2020, the FBI announced that it has received multiple reports of video-teleconferencing (VTC) hijacking attacks in recent weeks. The attacks target the VTC platform Zoom and involve unidentified individuals joining online meetings and disrupting them with pornographic and/or hate images and speech. This type of attack is being referred to as “Zoom-bombing.” ...