Cybersecurity2 hrs ago

NY Regulator Hits Delta Dental with $2.25 M Fine Over MOVEit Breach

New York fines Delta Dental $2.25 million for failing to patch MOVEit Transfer and delayed breach reporting, highlighting enforcement of state cyber regulations.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn

No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.

New York’s Department of Financial Services fined Delta Dental $2.25 million for not patching a known MOVEit Transfer flaw and for slow breach notification.

Context In early 2024 Delta Dental Insurance Company and its New York affiliate were found to have exposed personal data of thousands of policyholders. The breach stemmed from a vulnerability in MOVEit Transfer, a file‑sharing application widely used for moving large data sets. The vulnerability (CVE‑2023‑3576) was publicly disclosed in June 2023, and New York regulators warned covered entities to remediate it promptly.

Key Facts - The attackers accessed MOVEit servers, extracted names, addresses, Social Security numbers, bank account details, and patient health information. - Investigation revealed that Delta Dental’s incident‑response plan failed to detect the intrusion quickly and did not meet the state’s reporting deadline. - Regulators determined the firm ignored the June 2023 advisory, leaving the vulnerable software in production. - The Department of Financial Services imposed a $2.25 million civil penalty, citing violations of New York’s cybersecurity regulation (23 NYCRR 500). - Delta Dental notified affected New Yorkers in March 2024, months after the initial compromise.

What It Means The fine signals that New York will enforce its cyber‑risk framework aggressively, especially when known vulnerabilities are left unpatched. Financial‑services firms must treat vendor‑issued advisories as actionable mandates, not optional guidance. Failure to do so can trigger both regulatory penalties and reputational damage.

Mitigations - Apply the MOVEit Transfer patch released by Progress Software immediately; verify version compliance across all environments. - Implement continuous vulnerability scanning to flag unpatched CVEs (Common Vulnerabilities and Exposures) within 48 hours of disclosure. - Harden incident‑response playbooks: include automated alerts for anomalous file transfers and enforce a 24‑hour reporting window to regulators. - Deploy network segmentation to isolate file‑transfer servers from core business systems, limiting lateral movement. - Conduct regular tabletop exercises that simulate a MOVEit compromise to test detection and escalation procedures.

What to Watch Next Regulators are expected to release additional guidance on third‑party risk management, and more firms may face penalties for similar lapses. Security teams should monitor upcoming NYDFS advisories and adjust compliance programs accordingly.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...