{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

08/21/2020
linkedin facebook twitter instagram
WorkScoop
A medical facility in upstate New York is recovering after a long downtime. The list of potential election meddlers only seems to be growing. And Uber's former CSO faces criminal charges. This is CyberScoop for Friday, August 21.

A New York hospital is healing after a medical breach

For three weeks, a 290-bed medical facility in upstate New York has been grappling with a cybersecurity incident that prevented doctors from accessing patients’ electronic medical records. EMRs and payroll and accounting systems are now back online, the Samaritan Medical Center said in a statement Wednesday, but restoring the entire computer network will still take time. The not-for-profit Watertown, New York, institution — which says it generates $395 million annually in economic activity — blamed a “malware attack” for the disruption. There was no evidence that patient data had been compromised. Sean Lyngaas explains.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


All eyes on 2020 influence

Cuba, Saudi Arabia, and North Korea are working to influence U.S. elections by running information operations, alongside Russia, China, and Iran, according to the top U.S. counterintelligence official, Bill Evanina. “We have other countries getting in the nexus because they think it works…They want to be able to provide their optics for discord in the United States,” Evanina said during a U.S. Chamber of Commerce event. Evanina also said he’s concerned about “nation-state actors surveilling different parts of infrastructure that...could considerably have an impact on election come Election Day,” such as manipulating vote tallies. Shannon Vavra has the details.


Ex-Uber CSO charged over that big cover-up

U.S. prosecutors have charged the former Chief Security Officer at Uber with allegedly covering up a data breach at the ride-hailing company that exposed information tied to roughly 57 million people. Joe Sullivan, who now works as the chief information security officer at Cloudflare, allegedly committed two felonies by not informing investigators about the hack while they probed the circumstances surrounding a prior data breach. He faces up to eight years in prison if convicted on all charges. Jeff Stone has the complaint.


Security pros like Ohio's election plan

A pair of cybersecurity experts praised Ohio’s new vulnerability disclosure policy for its election-related websites as being a mark of a mature organization. Matt Olney, a director at Talos, Cisco’s threat intelligence division, and Matt Masterson, a senior adviser to the federal Cybersecurity and Infrastructure Security Agency, said the new initiative shows how far along some state governments have come in protecting their election infrastructure. The policy only applies to websites, not physical equipment such as voting machines or electronic pollbooks. StateScoop's Ben Freed is on it.


Ransomware continues to pay off for hackers

University of Utah administrators said they paid attackers $457,000 to delete the sensitive student and teacher data that had been stolen from their servers in a ransomware attack. Though they determined that only 0.02% of the data from those servers had been affected and the office restored all encrypted data from backups, the hackers demonstrated to the university that they had, in fact, stolen sensitive data and would publish it unless they were paid. Colin Wood looks closer at EdScoop.


Contact tracing adoption depends on privacy

Universities have launched mobile apps to collect COVID-19 health data on students and faculty, but some schools are now facing backlash over privacy concerns and how the apps are implemented. Colleges say constant access to students’ location data is necessary to track the spread of any outbreaks on campus, but students and their parents expressed privacy concerns over one app after at least two security vulnerabilities were discovered, which allowed access to the app’s back-end servers and potentially to students’ COVID-19 test results. EdScoop's Betsy Foresman offers context.


Tweet Of The Day

Image

Ask around. There are certainly are enough people who would know...


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}