4 Trending Cybersecurity News Stories of the Week

By Eric Noonan • March 25, 2016

This past week has been riddled with cyber attacks.  Three major industries – Healthcare, Banking, and Telecommunications – have either had customer data stolen or held hostage.   And last but not least, a historic face-off between technology and policy with Apple refusing to provide the FBI with the necessary information to access data on a known criminal’s iPhone.

So whether you are returning from a well-deserved vacation or drowning in looming project deadlines, we don’t want you to miss out on this week’s cybersecurity happenings.  To help you get caught up, we have compiled links to the top four trending cybersecurity news stories of the week.

Happy reading!

4 Trending Cybersecurity News Stories of the Week

Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection

Once again a Ransomware attack has infected a hospital’s computer network.  Unlike the attack on Hollywood Presbyterian Medical Center, which we discuss in our blog here, this recent attack of Methodist Hospital based in Kentucky is currently positioning themselves to not pay the ransom.  The article describes the details of the attack as well as delves into its aftermath.

Read more here

Crooks Steal, Sell Verizon Enterprise Customer Data

Verizon Enterprise Solutions has confirmed that their network has been hacked resulting in the “theft and resale of customer data”. KrebsOnSecurity learned that Verizon recently identified a vulnerability in its site that allowed hackers to access customer information.

Read more here

Federal Grand Jury Indicts 7 Iranians for “Campaign of Cyber Attacks”

The US Justice Department announced this week that a federal grand jury has issued indictments for seven Iranians employed by two information technology companies.  The indictments allege the companies were contracted by the Iranian government to conduct cyberattacks against US banking institution websites and attempt to breach the supervisory control and data acquisition (SCADA) network of a dam near Rye, NY.

Read more here

In Apple vs. the FBI, technology wins

The showdown between Apple vs the FBI has garnered a lot of media attention with privacy advocates and policymakers all weighing-in.  According to a recent article published by TechCrunch, it is not surprising. The article explains why technology will almost always win over policy.

Read more here

Cybersheath Blog

CMMC Compliance Dashboard: Gain New Visibility into Compliance

CMMC is not a compliance framework. It’s a maturity model. That has big implications for how you approach compliance, but also how you keep track of all the elements that make up compliance. And yet, visibility has been one of the most difficult challenges facing DIB contractors. It used to…

CMMCEnclave: Add Versatility with a More Flexible Approach

The enclave approach to CMMC compliance is one of the most cost effective and least disruptive ways to safeguard CUI. You can maintain high-value custodial security of CUI without upending your existing processes, procedures, and people. That way, you can maintain the proper level of CMMC compliance and remain eligible…

How to Offboard Your Managed Services Provider

For any of a variety of reasons including lack of communication, slow response times, or prolonged downtime, your organization has decided to change your managed service provider (MSP). Whether you have already signed an agreement with a new MSP or you are actively looking for a replacement, now is the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft