By Jaclyn Jaeger2016-03-01T14:45:00
Imagine this: You’re a large healthcare provider whose staff is having trouble accessing vital records in your hospital’s computer network. Your IT department begins an immediate investigation and determines the cause to be a malware attack. Worse yet, the attackers are demanding ransom to obtain the decryption key. How do ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2017-05-23T01:15:00Z By Joe Mont
A global hack attack that held organizations’ data hostage for Bitcoin ransoms raises regulatory issues, disclosure debates, and risk management concerns.
2026-01-16T20:32:00Z By Oscar Gonzalez
The U.S. Federal Trade Commission finalized its order against General Motors and its OnStar subsidiary over the improper usage of geolocation and driving behavior data of drivers.
2025-12-10T15:29:00Z By Mark Diamond, CW guest columnist
Companies are giving their records management programs a makeover, and not for the reasons you may think. What used to be a sleepy back-office legal department function is now front and center, often driven by compliance teams. Organizations are discovering that a “save everything, forever” de facto policy doesn’t ...
Site powered by Webvision Cloud