First Class Action Lawsuit Filed on Behalf of Victims of First American Title Company Data Breach — Yahoo!

June 26th, 2019|Categories: HB Risk Notes|Tags: , , , , , , , , , , |

"Gibbs Law Group LLP has filed the first nationwide class action lawsuit accusing First American Title Company of failing to properly secure 885 million sensitive customer files, instead choosing to store them in a 'woefully insecure,'” publicly-accessible system. “First American has turned the American dream of home ownership into a financial security nightmare for its customers,” according to the complaint. Specifically, the lawsuit alleges that First American Title Company was negligent, and violated its contracts with customers, in the way it stored their personal information, which included bank account numbers, Social Security numbers, financial and tax records, and photos of their drivers’ licenses. "This grave lapse in security resulted in publicly exposing hundreds of millions of customers’ personal files, leaving them vulnerable to identify theft and other cybercrimes," the plaintiffs maintain.    Read the complete Press Release on Yahoo! here

The Future of Cyber Operations and the Government

June 7th, 2019|Categories: HB Risk Notes|Tags: , , , , , , , |

In the forthcoming National Defense Authorization Act the House Armed Services Committee -- specifically the Subcommittee on Intelligence and Emerging Threat Capabilities -- seeks to amend the annual legislation to ensure that Congress is informed when the executive branch executes offensive or defensive cyber operations. The bill defines offensive or defensive cyber operations as a “sensitive military operation.” The goal of this shared information is additional oversight, especially given the newness of cyber tactics. As reported by journalist Derek B. Johnson of FWC.com, two covert cyber operations have taken place since POTUS announced the new policy. The first was in October 2018, a cyber operation with a goal of informing Russian operatives not to meddle with the midterm election. The second took place the following November in which the U.S. Cyber Command blocked access to Russian Internet Research Agency post election. While these two operations have been called “mild” in some critiques, former White House Director of Cyber Infrastructure Protection under President George W. Bush, Jason Healey, believes this highly specialized tactic is ideal since it presents the least potential for collateral damage. While Healey warns against grand and overt attacks, he states that sometimes "conflict is straightforward and you just have to stop adversaries from punching you in the mouth.” Read the complete post by Derek B. Johnson on FCW.com here.

Go to Top