When Was OSHA Founded?
OSHA was founded on April 28, 1971 – four months after President Nixon had signed the Occupational Safety and Health Act (the OSH Act). The Act had the objective of ensuring safe and healthy conditions for working individuals by adopting, developing, and enforcing safety standards, and by assisting states with their own safety initiatives. OSHA’s Foundation Years Although OSHA opened its doors in April 1971, the foundation for its activities came from a much earlier time. Since 1922, the Bureau of Labor Standards had been the federal agency responsible for workplace safety and health; and, in addition to many industry-specific safety and health regulations already in existence, a number of states had adopted their own workplace safety standards. OSHA had a strong foundation from which to develop and plenty of funding to support its development. By 1972, the Administration had approved State OSHA Plans in South Carolina, Oregon, and Montana, published its first original standard – lowering the permissible limit for worker exposure to asbestos – and established the...
Is Microsoft Outlook HIPAA Compliant?
Microsoft Outlook is HIPAA compliant provided that organizations subscribe to an Office 365 or Microsoft 365 enterprise plan that supports HIPAA compliance, that the service is configured to be used compliantly, and that users are trained to use Microsoft Outlook in compliance with HIPAA. Software is never HIPAA compliant by default as HIPAA compliance is not so much about what technology is used, but how it is used. That said, software and email services can support HIPAA compliance. In order for an email service to support HIPAA compliance, it must include a range of security features to ensure that any information uploaded to and transmitted through the service can be done so securely, without risking the exposure or the interception of sensitive data. The platform provider must also be prepared to sign a Business Associate Agreement with HIPAA-covered entities, and by doing so, agree to comply with the requirements of the HIPAA Privacy, Security, and Breach Notification Rules. Microsoft has a standard Business Associate Agreement which covers Office 365 and Microsoft 365...
QR Codes Increasingly Used in Phishing Attacks
Malware phishing attacks, where phishing emails are used to trick end users into downloading and executing malicious code, have been an effective way of gaining access to internal networks for many years. Malware phishing is the initial infection vector in a large number of cyberattacks, many of which often end with ransomware being deployed. The tactics, techniques, and procedures (TTPs) used by threat actors in phishing attacks are constantly changing, and a new trend has emerged where QR (quick response) codes are used for malware phishing. According to Hoxhunt, 22% of phishing attacks in October 2023 used QR codes. QR codes are machine-readable images that consist of a matrix that transmits information. The codes were invented by a Japanese automobile manufacturing company in 1994 as a way of connecting the digital and physical world. They were initially used to track vehicle parts during manufacturing processes; however, the use of QR codes has grown considerably thanks to the widespread use of smartphones. QR codes are commonly used to direct users to websites. A mobile phone...
Feds Issue Guidance on Stopping the Phishing Attack Cycle at Phase One
Phishing is one of the most common methods used by malicious actors to gain initial access to internal networks. Phishing is a form of social engineering where victims are tricked into disclosing their credentials or visiting a malicious website where malware is downloaded. Stolen credentials are used to access accounts and sensitive data, and the malware downloaded gives threat actors persistent access to internal networks and allows them to perform a range of nefarious activities. A large percentage of HIPAA compliance data breaches on the Office for Civil Rights (OCR) breach portal started with a response to a phishing email. Defending against phishing attacks can be challenging. While cybersecurity solutions such as spam filters and secure email gateways can be implemented, phishing emails often bypass these defenses and land in inboxes. Network defenders often blame successful phishing attacks on users who opened the emails, followed links, or disclosed their credentials, but the emails can be difficult to identify, and it is impossible to completely prevent human error even...
Ragnar Locker Ransomware Infrastructure Taken Down and Suspected Developer Arrested
Europol has announced that it has taken down the infrastructure that was used to support Ragnar Locker ransomware attacks and a suspect believed to be one of the group’s developers has been arrested. The Ragnar group started conducting attacks using Ragnar Locker ransomware in December 2019. The group is known to have attacked at least 168 organizations, including the Italian drinks giant Campari and the Japanese gaming firm Capcom, as well as many critical infrastructure entities. Ragnar Locker was one of the first big game hunting ransomware groups to steal data to pressure victims into paying ransoms in addition to encrypting files. In contrast to many ransomware groups, Ragnar Locker was not a ransomware-as-a-service (RaaS) operation and instead collaborated with external penetration testers to gain initial access to victims’ networks. Europol said raids and searches were conducted of multiple properties in Czechia, Spain, and Latvia between October 16 and October 20, and five individuals who are believed to be associated with the group have been interviewed in Spain and...



