One might conclude that there had been a cyberattack after Southwest Airlines cancelled more than 700 flights on July 21, 2016, but Southwest claimed that the IT system failed and then “…the backup failed and then the restoration process also failed. It took about 12 hours to finally get all

Continue Reading Southwest Airlines – Cyberattack or failed disaster recovery?

In 1986 Congress passed the Stored Communications Act (SCA) to control telephone records long before the Internet we know today, but the SCA is the main law that Internet companies rely to protect users’ content and in 1986 in passing the SCA “Congress focused on providing basic safeguards for the

Continue Reading Microsoft contempt ruling overturned for failing to produce emails in Ireland!


There is little surprise to learn that cybercriminals are now focused at “healthcare IT infrastructure,…also connected medical devices, mobile computing devices used by medal staff and, most profitably, electronic health records (EHR) systems.”  The July 12, 2016 DarkReading report entitled “Healthcare Hacks Face Critical Condition” referenced InfoArmor’s report

Continue Reading Cyber risk for HIPAA data increasing as criminals are now focused at healthcare technology!


People should be thoughtful of using My Activity because destroying your Google history in litigation may lead to a claim of spoliation (destruction of evidence) when using Google’s recently launched My Activity which “is a central place to view and manage activity like searches you’ve done, websites you’ve visited, and

Continue Reading Spoliation or Privacy “Right to be Forgotten”? – Google’s new service “My Activity” allows you to delete your history!


An appellate court agreed that “Travelers is duty bound under the Policies to defend Portal [Portal Healthcare Solutions, L.L.C.] against the class-action complaint”…that “alleges that Portal and others engaged in conduct that resulted in the plaintiffs’ private medical records being on the internet for more than four months.”  In the

Continue Reading Court rules that Travelers must defend cyberintrusion of medical records (HIPAA?) under CGL policy


Webroot recommends that you “need to set up a regular backup regimen that at a minimum backs up data to an external drive, or backup service, that is completely disconnected when it is not performing the backup.”  On May 18, 2016 Webroot issued “A Guide to Avoid Being a

Continue Reading Good idea -Ransomware may be avoided if you backup your data to 3 locations!


BDO’s annual RiskFactor Report for the first time cites that manufacturers’ top 10 concerns about “operational infrastructure risk, including information systems and implementation of new systems and maintenance.”  The “2016 BDO Manufacturing RiskFactor Report” issued in June 21, 2016 introduced the subject with this headline “Manufacturers Scamper to

Continue Reading Cybersecurity jumps to the 9th top concern of 91% of manufacturers!


The New York Times’ article about the morality of AI auto driving decisions may be based on  “government requirements for autonomous car morality might be one way to go, though the people surveyed in the Science article say they are not keen on that. Manufacturers could also tailor morality to

Continue Reading Do you trust the government to set morals for AI (Artificial Intelligence) to drive cars?


Reuters reported that “Grandpoint said the coverage includes losses from wire-transfer scams including business email compromise [BEC]. In business email compromise schemes, fraudsters pose as executives or vendors from a business, sending requests for money transfers to accounts controlled by criminals.”  Grandpoint operates in Southern California, Arizona and Southern Washington

Continue Reading Great news! Cyberinsurance for Spearphishing (BEC) now available from Grandpoint Bank


Forrester’s Report includes this observation for CISOs [Chief Information Security Officers] that creating “and maintaining a security strategy is fundamental for CISO success” but “…business colleagues need to be able to understand your strategy. If you cannot communicate it in a clear and concise manner, then all of your work

Continue Reading Cybersecurity strategies for CISOs includes clear communications in plain English, not technical jargon!