With over 106 million customers and applicants’ personal data exposed, the Capital One breach is one of the biggest breaches of a financial institution in US history. A former employee of Amazon’s cloud-computing unit was able to exploit a vulnerability in Capital One’s cloud service provider AWS,exposing some 140,000 Social Security Numbers and 80,000 bank account numbers of US customers.
The US nuclear industry’s safety record is stellar, in part thanks to NRC regulations that arose from Three Mile Island. But complying with NRC regulations is costly: annual ongoing regulatory costs can range from $7.4 million to $15.5 million per plant and can have significant impact on plants and companies’ profitability—with regulatory costs in some cases exceeding profit margins. But while complying with NRC regulations is necessary, the high costs don’t have to be. Nuclear plants can easily and cost-effectively meet NRC regulations with streamlinedemergency preparedness plans that rapidly address events while reducing potential for error.
On Tuesday, May 7, Baltimore city employees came into work to find that their computer screens were locked. “We’ve been watching you for days,” the message on their screens read, “We won’t talk more, all we know is MONEY! Hurry up!” The city of Baltimore had been hit by a ransomware attack; the hackers were demanding $100,000 in bitcoin to release their files.
Consistent communication and collaboration can be tricky when it comes to home healthcare—especially since it involves so many different people in many different places. Along with home healthcare professionals, a patient’s care team can include anyone from their primary care doctor to a range of specialists to family members and other caregivers. Fortunately, HIPAA-compliant mobile messaging (from mobile devices or tablets) is one way to address that challenge, keeping care teams in the loop no matter where they are and with minimal interruption to their schedule.
Smartphones have become an indispensable part of our lives. We use it to keep in touch with families and friends, to handle our bank transactions, to arrange transportation, even to track our health—so it makes a ton of sense for pharmacies to use smartphones to increase patient engagement and satisfaction.
A historically industrial area, Marshall County, West Virginia is accustomed to the occasional industrial emergency. So, when a gas pipeline exploded in June of 2018, people knew exactly what to do. As first responders handled over 37 calls in 3 minutes, they dispatched resources to the site of the emergency. No fatalities, injuries, or property damage was reported as a result of the emergency and damage was contained to 1,100 feet around the site. This was in part thanks to Marshall County’s oil and gas task force, which brings together emergency management officials, first responders, local schools, and representatives from the oil and gas industry to address potential emergencies. Marshall County’s oil and gas task force and its impact on emergencies highlights the importance of engaging multiple stakeholders via regular communications when it comes to incident response.
In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of directors do to protect sensitive corporate data? It is all too easy for information to be inadvertently exposed—whether as a result of hacking, a slip of the finger that results in an email being sent to the wrong person, or a disgruntled employee who decides to share confidential information via a text.
As we enter into cybersecurity month it makes me think a lot about my own privacy, and how elusive it has become in the 21st century. It seems that everything we do is now tracked; whenever we visit a web page, call someone on our smart phone, visit the doctor, change the temperature on our smart thermostat or simple talk about a specific subject in our own household, our actions get recorded as data – in theory to make our lives better and more productive. However, in an age when digital privacy is practically an oxymoron, what can people do to protect their privacy?