Search Results for "new york"

New York SHIELD Act Explained: What It Means for Cybersecurity, Privacy

Data security provisions of New York’s Stop Hacks and Improve Electronic Data Security (SHIELD) Act are now in effect. Here’s what that means.

Sodinokibi Ransomware Attack Hits MSP, New York Airport

A Sodinokibi ransomware attack spread from an upstate New York hosting provider and MSP to Albany airport’s IT systems during the Christmas 2019 holiday.

New York Phishing Attack: Nassau County Recovers $710,000

Nassau County, New York, investigators recover $710,000 after phishing attack triggers fraudulent invoice payment.

Fortinet Accelerate 2020 New York City: Canceled – Coronavirus Concerns

Fortinet Accelerate 2020 New York City conference is canceled amid coronavirus outbreak concerns.

Long Island Ransomware Attack: New York School Pays $100,000

Ryuk Ransomware attacks Long Island, New York’s Rockville Centre school district. School taps insurance to pay hackers nearly $100,000 in ransom.

New York Financial Services Dept Creates Cybersecurity Division

New York’s Department of Financial Services (DFS) creates a new cybersecurity division tasked with protecting consumers and industries from cyber threats.

DynTek Professional Technology Services Launches New York SOC

Professional technology services provider DynTek launches a security operations center (SOC) in Albany, New York to expand its cybersecurity services.

Albany Ransomware Attack: Malware Hits New York State’s Capital City

Albany, New York, ransomware attack confirmed by Mayor Kathleen Sheehan. Malware hits Albany police department computer systems, reports assert.

ISACA Confirms New York, European Cybersecurity Conferences

ISACA confirms 2019 cybersecurity conferences in New York and Europe, and new educational content for association’s 50th anniversary.

Another New York DFS Cybersecurity Deadline Looms

The New York DFS data security regulation for financial services firms has a September 2018 deadline for audit trails, application security, data retention limitations, access monitoring, and encryption of non-pubic information.