digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

837
active users

#incidentreponse

0 posts0 participants0 posts today
Dissent Doe :cupofcoffee:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@amvinfe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>amvinfe</span></a></span> <span class="h-card" translate="no"><a href="https://noc.social/@AAKL" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>AAKL</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>brett</span></a></span> <span class="h-card" translate="no"><a href="https://ioc.exchange/@jgreig" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jgreig</span></a></span> </p><p>It seems pretty clear from what BianLian has posted that there were TWO unrelated attacks, but Akumin has only disclosed the first attack -- even though it has issued updates since the time of the second attack.</p><p>That said: if the second attack was in November, as it allegedly was, then Akumin is still within a 60-day window from discovery to when it must notify HHS and affected patients. </p><p>But if an entity issues a press release or update that discloses one data breach but is silent on the fact that there was a second breach, too, resulting in the theft of patient data, is that a deceptive or unfair act under Section 5 of the FTC Act?</p><p><a href="https://infosec.exchange/tags/transparency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transparency</span></a> <a href="https://infosec.exchange/tags/incidentreponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentreponse</span></a> <a href="https://infosec.exchange/tags/extortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extortion</span></a> <a href="https://infosec.exchange/tags/healthsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthsec</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a></p>
Dissent Doe :cupofcoffee:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>brett</span></a></span> I don't know if I missed something or forgot anything, but have we seen any real statement from the hospitals or TransForm about whether they had recent and usable backups?</p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/HealthSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HealthSec</span></a> <a href="https://infosec.exchange/tags/backups" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backups</span></a> <a href="https://infosec.exchange/tags/restoration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>restoration</span></a> <a href="https://infosec.exchange/tags/incidentreponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentreponse</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
HiSolutions<p>Zwei von drei deutschen Unternehmen wurden im Jahr 2022 lt. eines aktuellen Reports Opfer einer Cyberattacke. </p><p>Im Creditreform <a href="https://infosec.exchange/tags/Podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podcast</span></a> spricht <span class="h-card" translate="no"><a href="https://infosec.exchange/@LisaLobmeyer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>LisaLobmeyer</span></a></span> über <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a>, <a href="https://infosec.exchange/tags/IT_Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT_Sicherheit</span></a> und präventive Maßnahmen für Unternehmen, um im Angriffsfall souverän reagieren zu können.</p><p>Jetzt hören ▶️ <a href="https://www.creditreform.de/aktuelles-wissen/podcast/podcast-details/show/it-sicherheit-souveraen-auf-angriffe-reagieren" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">creditreform.de/aktuelles-wiss</span><span class="invisible">en/podcast/podcast-details/show/it-sicherheit-souveraen-auf-angriffe-reagieren</span></a></p><p><a href="https://infosec.exchange/tags/IncidentReponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentReponse</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a></p>