Skip to content
Motiva Networks
Managed Security Service Provider
Motiva NetworksMotiva Networks
  • Cybersecurity
    • How Our Assessment Works
    • What is Cloud MDR ?
    • DFS Compliance
    • DFS 2024 Compliance Checklist
    • FTC Safeguards Rule
    • IDSL Compliance
    • NAIC’s Insurance Data Security Model Law
    • SHIELD Act Compliance
    • PA IDSA (PIDSA)
    • Partnership
  • Industries We Serve
    • Insurance
    • Mortgage
  • About Us
    • Reviews
  • Blog
  • Newsletter
  • Get Support
    • Free Network Assessment
    • Managed IT Services
  • (646) 374-1820Contact Us
  • Cybersecurity
    • How Our Assessment Works
    • What is Cloud MDR ?
    • DFS Compliance
    • DFS 2024 Compliance Checklist
    • FTC Safeguards Rule
    • IDSL Compliance
    • NAIC’s Insurance Data Security Model Law
    • SHIELD Act Compliance
    • PA IDSA (PIDSA)
    • Partnership
  • Industries We Serve
    • Insurance
    • Mortgage
  • About Us
    • Reviews
  • Blog
  • Newsletter
  • Get Support
    • Free Network Assessment
    • Managed IT Services
  • (646) 374-1820Contact Us

Category Archives: Cybersecurity

You are here:
  1. Home
  2. Category "Cybersecurity"

bitFlyer’s Cybersecurity Compliance Failure: Lessons for IT Service Providers

CybersecurityBy Walter ContrerasMay 16, 2023

In May 2023, bitFlyer found themselves in hot water as they entered into a Consent Order with the DFS. The order was a result of multiple…

cybersecurity-cybercrime-internet-scam

Western Digital’s Cloud Hacked; Hackers Stole From Internal Networks

CybersecurityBy Walter ContrerasMay 1, 2023

Hacking group, ALPHV – also known as BlackCat – claimed responsibility for the hack, and demanded that Western Digital negotiate a ransom payment to them to prevent insider data from being leaked

The Biggest Risk Is Not The One You Don’t Take, But The One You Don’t See

The Biggest Risk Is Not The One You Don’t Take, But The One You Don’t See

CybersecurityBy Walter ContrerasApril 24, 2023

Successful business professionals assess potential consequences and implement safeguards to reduce risks and potential losses.

CPAs targeted with new phishing attack amidst the rush of tax season

CPAs targeted with new phishing attack amidst the rush of tax season

CybersecurityBy Walter ContrerasApril 14, 2023

he phishing campaign begins with emails that appear to be from clients, sending necessary documents to complete their tax returns.

Beware the Emotet Malware Being Distributed as Fake W-9 Tax Forms from the IR

Fake W-9 Tax Forms from the IRS

CybersecurityBy Walter ContrerasMarch 27, 2023

Emotet is a sophisticated malware that is primarily spread through phishing emails that contain infected attachments or links to infected Microsoft Word or Excel documents.

The new cyber insurance ransomware, are you next

The new cyber insurance ransomware, are you next?

CybersecurityBy Walter ContrerasFebruary 27, 2023

HardBit 2.0 is able to modify victims Registry on their devices to disable Windows Defender’s real-time monitoring process among other protections.

Ransomware Attack Temporarily Shuts Down Dole North America

Ransomware Attack Temporarily Shuts Down Dole North America

CybersecurityBy Walter ContrerasFebruary 27, 2023

By taking these preventive measures, individuals and organizations can reduce their risk of falling victim to ransomware attacks and protect their sensitive information and data from theft.

What Agents Need To Know About NAIC’s Insurance Data Security Model Law

What Agents Need To Know About NAIC’s Insurance Data Security Model Law

CybersecurityBy Walter ContrerasFebruary 21, 2023

Under the NAIC Model Law, the regulations apply to insurers with ten or more employees, although some states have altered that number based on their own adoption of the laws.

Enhanced regulations include that if a covered entity fails to implement just 1 (ONE) part of the necessary compliance regulations, they are not counted as being within compliance and therefore failing to adhere to the law. This makes it exceptionally critical to maintain cybersecurity regulation requirements once implemented.

Staying Ahead: What Agencies Need to Know About NY DFS 23 NYCRR 500’s New Amendment Changes

CybersecurityBy Walter ContrerasFebruary 17, 2023

Companies must also implement policies and procedures to protect their data, train their employees in cybersecurity best practices, and ensure that third-party vendors are also compliant with the regulation.

3.3 Million Patients’ Data Compromised in Heritage Provider Network Ransomware Attack

3.3 Million Patients’ Data Compromised in Heritage Provider Network Ransomware Attack

CybersecurityBy Walter ContrerasFebruary 13, 2023

The attack has currently affected the ADOC Medical Group, Greater Covina Medical, Lakeside Medical Organization, and Regal Medical Group.

←1
2345
…678910…
1112131415161718192021
22→

ABOUT US

We are a Managed IT Services firm based in NY. We deliver to CEOs like you a profit-centric approach to IT. Our deliverable is MONEY, EFFICIENCY and peace of mind (SECURITY).

Link To Facebook Link To Twitter Link To Linkedin Link Youtube

RESOURCES

  • Get Support
  • Book a Consultation
  • NYDFS Cybersecurity Law Explained
  • Walter Contreras
  • Privacy Policy
Menu
  • Get Support
  • Book a Consultation
  • NYDFS Cybersecurity Law Explained
  • Walter Contreras
  • Privacy Policy
  • Get Support
  • Book a Consultation
  • NYDFS Cybersecurity Law Explained
  • Walter Contreras
  • Privacy Policy
Menu
  • Get Support
  • Book a Consultation
  • NYDFS Cybersecurity Law Explained
  • Walter Contreras
  • Privacy Policy

Contact Us

  • 1100 Franklin Avenue, Garden City NY 11530
  •   info@motiva.net
  •   (646) 374-1820
Motiva-Network

© 2025 Motiva Networks – All Rights Reserved.

GIBI Motiva
Go to Top