Another breach was announced today by Time Warner Cable. The F.B.I notified the company that email addresses, including passwords, may have been comprised of over 320,000 customers
Nathlie Burgos, Time Warner Cable Group Vice President, Public Relations said, “we haven’t yet determined how the information was obtained, but there is no indication that our systems were breached.”
It is likely that the email addresses and passwords were stolen through some type of a malware downloaded during phishing attacks or breaches through other companies.
Data breaches can hit any organization, of any size, in a number of ways, and hackers are always trying to find new vulnerabilities. As a result, there has never been a better time to assess what can be done to guard against any form or a data loss.
Research from 2015 Cyberthreat Defense Report and the Privacy Rights Clearinghouse, has shown a steady increase in breach activity since 2014.
Just last month, December 2015, there were reported 10 healthcare breaches, effecting over 35,000 individual records.
In this coming year, organizations of all types and sizes should be ensuring that they are protecting their trusted data by using a three step process:
Implement or update your data usage policy
Employee training and more training
Design technology to protect your endpoints and the data they contain
Judith Lindsay, CHP and CEO of JAL Consult tackles all the elements of HIPAA compliance puzzle. Successfully assisting organizations to make sense of it all by implementing the correct policies and procedures that are reasonable and appropriate for their entity. Judith provides consulting, training and is available for speaking engagements. To read more about the world of compliance subscribed to JAL’s insightful newsletter at www.jalconsultantsaz.com OR follow JAL on Twitter @ judithconsult
Personal Information Collected Online
•Personal Information means personally identifiable information such as information provided via forms, surveys, applications or other online fields including name, postal or email addresses, telephone, fax or mobile numbers, or account numbers.
•Before or at the time of collecting personal information, JAL will identify the purposes for which the information is being collected.
•JAL will collect and use personal information solely for the purpose of fulfilling specific contracted engagements or for other compatible purposes, unless consent is obtained from the company and/or individual concerned or as required by law.
•JAL will retain personal information as long as necessary for the fulfillment of a specific contract or for a specific purpose.
•JAL will collect personal information as deemed lawful and where appropriate with the knowledge and/or the consent of the individual or company.
•Personal data should be relevant to the extent of necessary purposes and should be accurate, complete and up-to-date.
•JAL will protect personal information by reasonable safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
•JAL will make readily available to customer’s information about our policies and practices relating to the management of personal information. Terms and Conditions
JAL is committed to conducting our business in accordance with these principals in order to ensure that the confidentially of personal information is protected and maintained. By accessing this website, you are agreeing and bounded by these Website Terms and Conditions of Use, all applicable laws and regulations. If you do not agree with these Terms and Conditions, you are prohibited from using or accessing this website. The materials contained in this Web Site are protected by all applicable copyright and trade mark laws.
Our Online Notices are subject to change. Please review it periodically. If we make changes, we will revise the “Last Updated” date at the top of this Notice. Any changes will become effective the date the revised Notice is posted on the Site.