The U.S. Department of Labor's Occupational Safety and Health Administration (OSHA) has issued guidance and an accompanying one-pager to help employers understand which standards are most frequently cited during coronavirus-related inspections. OSHA based these documents on data from citations issued, many of which were the result of complaints, referrals and fatalities in industries such as hospitals and healthcare, nursing homes and long-term care facilities, and meat/poultry processing plants.
During the week of October 25, 2020, the UVM Health Network experienced a confirmed cyberattack affecting some systems. Despite standby procedures in place to continue providing safe care, the attack caused variable impacts on services at affiliate organizations.
The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force released an analysis report on the impact of COVID-19 on global supply chains. Building A More Resilient ICT Supply Chain: Lessons Learned During The COVID-19 Pandemic examines how ICT supply chains have been logistically impacted by the pandemic and provides practical recommendations to increase supply chain resiliency from future risks.
Cal State San Bernardino’s Cybersecurity Center will host the annual Center of Academic Excellence (CAE) in Cybersecurity Symposium this year to be held virtually Nov. 19-20.
On November 4, 2020, the California Privacy Rights Act (CPRA) passed, with a decisive majority of Californians (56% according to the Secretary of State's web site) supporting the measure to strengthen consumer privacy rights. Here, we talk to Heather Federman, Vice President of Privacy & Policy at BigID, about this sweeping privacy law that will set the bar for privacy rights for the rest of the nation.
Overlooked risks can cost companies millions in financial and reputational damage — but existing commercial threat intelligence solutions often lack data coverage, especially from these alternative web spaces.
How does this impact corporate security operations, and how can data coverage gaps be addressed?
Data must be protected. There’s no argument about that. Solutions to protect data at rest and data in motion have been around for decades. The problem is that for data to be useful, it has to be processed, and, until recently, processing left data wide open to theft or attack.
The U.S. Fire Administration (USFA) report, “Firefighter Fatalities in the United States in 2019,” revealed that 62 firefighters died from injuries sustained while on duty, 22 less than the 2018 total of 84 firefighters.
A third wave – feels more like a third tsunami. Many haven’t returned to the office; some may end up back in work-from-home scenarios. While workers may feel safe at home, false senses of complacency can easily mask very real cyber threats. Cybercriminals don’t pause for pandemics. With the increase in remote work, an explosion in cybercriminal activity, like phishing, has followed. Not only is phishing still prevalent, but it’s rising much like that third wave.
For most of this year, COVID-19 has dominated and disrupted our normal business routines, and as we relocated to avoid the first wave of the virus, the hackers and thieves weren’t far behind. As people began working remotely in large numbers, the number of unsecured remote desktops soared, as did brute-force attacks against those desktops.