{"id":1631,"date":"2020-04-30T12:56:00","date_gmt":"2020-04-30T12:56:00","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1631"},"modified":"2020-04-30T17:59:41","modified_gmt":"2020-04-30T17:59:41","slug":"labcorp-sued-by-investors-for-deficient-cybersecurity-measures","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2020\/04\/30\/labcorp-sued-by-investors-for-deficient-cybersecurity-measures\/","title":{"rendered":"LabCorp Sued by Investors for Deficient Cybersecurity Measures"},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte\u00a0 \u00a0 04-30-2020<\/strong><\/h4>\n<p>\u00a0<\/p>\n<h4>An effective 3rd-party risk management program can protect your company from possible reputational, operational, and litigation damages.<\/h4>\n<h2>When you have the opportunity to protect your data, do it, don&#8217;t wait.<\/h2>\n<p>Legal risk is one of the several types or risk a company will face when defending against internet threats. This lawsuit against LabCorp by its investors will negatively affect an already-tarnished reputation, operations in terms of expected net cash loss, and of course the time and expense of the lawsuit itself. It may also bring personal liability for LabCorp&#8217;s officers: &#8220;LabCorp&#8217;s chief executive, chief information officer, and chief financial officer are specifically named in the Delaware court case, which accuses them of ignoring &#8220;persistently deficient cybersecurity measures&#8221; that led to a data breach and malware infection.&#8221;<\/p>\n<p>&#8220;LabCorp\u2019s board and top executives were hit with a Delaware lawsuit blaming them for investor losses stemming from two massive data breaches by a billing vendor that exposed the personal information of millions of patients.&#8221; &#8220;A data breach occurring at the American Medical Collection Agency (AMCA) lasted for a period of eight months, between August 2018 and March 2019. The billing agency&#8217;s breach, in which a threat actor was able to compromise internal networks, <strong>led to the theft of information belonging to at least 20 million US citizens.<\/strong>&#8221; &#8220;AMCA was unable to handle the financial ramifications of the security incident and later filed for bankruptcy.&#8221; &#8220;According to the lawsuit, failing to address these problems has impacted investors and resulted in financial losses due to share price changes, and therefore, damages are sought.&#8221;<\/p>\n<ul>\n<li>Risk Management<\/li>\n<li>Legal Risk<\/li>\n<li>3rd-party Risk Management<\/li>\n<li>Data Loss Protection<\/li>\n<\/ul>\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/www.zdnet.com\/article\/investors-sue-labcorp-for-failures-to-shore-up-security-in-light-of-data-breach-ransomware-attack\/\" class=\"vlp-link\" title=\"Investors sue LabCorp over security failures in light of data breach, ransomware attack | ZDNet\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/04\/30\/2734fc13-1d9a-41b1-aef6-3ca048f6cbfb\/thumbnail\/770x578\/555add83cd186cc728576e7e3284eeaf\/lab.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tInvestors sue LabCorp over security failures in light of data breach, ransomware attack | ZDNet\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tMalware-free or fileless techniques accounted for 51% of attacks last year, compared to 40% the year before, as hackers turn to stolen credentials to breach corporate networks.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>04-30-2020 | An effective 3rd-party risk management program can protect your company from possible reputational, operational, and litigation damages.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,33],"tags":[36,8,38,37,35,34],"class_list":["post-1631","post","type-post","status-publish","format-standard","hentry","category-data-breach","category-risk-management","tag-3rdpartyriskmanagement","tag-cybersecurity","tag-datalossprotection","tag-dlp","tag-legalrisk","tag-riskmanagement"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1631"}],"version-history":[{"count":2,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1631\/revisions"}],"predecessor-version":[{"id":1633,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1631\/revisions\/1633"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}