left-caret

PH Privacy

NYDFS Urges Covered Entities to Review Security Practices Amidst World Turmoil

June 26, 2025

By Aaron Charfoos,Michelle A. Reedand Jeremy Berkowitz

Citing “escalating global conflict,” the New York Department of Financial Services issued an alert on Monday, June 22, 2025, to its regulated covered entities, urging them to be vigilant against potential security threats, particularly ransomware and phishing attacks. NYDFS recommended covered entities assess their current cybersecurity programs, including by:

  1. Testing and updating incident response and business continuity plans, especially the ability to restore backup data.
  2. Providing refresher cybersecurity training to employees and contractors, making them aware of recent threats.
  3. Reviewing all vulnerability management tools, including endpoint detection protocols, to ensure they are equipped to detect unauthorized activity and new threats.
  4. Ensuring that they have robust access management controls in place, particularly around privileged access, operationalizing multifactor authentication and having the ability to disable or secure remote desktop protocol sessions.
  5. Reviewing their risk assessments to ensure it aligns with cyber-risk landscape changes.

The alert also reiterated reporting requirements under NYDFS Part 500 Cybersecurity Regulation (to report any security incidents within 72 hours, via the secure Department Portal, which can be accessed from the Cybersecurity Resource Center), as well as notifying relevant law enforcement agencies.

NYDFS issued the alert as companies are also in the final stages of implementing the requirements of the Part 500 amendment that was finalized and approved in November 2023. Since then, new rules that are part of the amendment have gone into effect in scheduled phases, focused on a number of topics, including: cybersecurity policies; incident response and business continuity plans; security office and board responsibilities; vulnerability management practices; and risk assessment procedures. In November 2025, the final set of rules go into effect, including requirements for:

  1. The implementation of multifactor authentication for any individuals accessing any of the covered entities’ information systems, unless an entity’s chief information security officer approves the equivalent of alternative compensating controls.
  2. Maintaining an updated asset inventory that contains key information for all hardware and software assets, including:
    1. Asset owners
    2. Asset locations
    3. Classification of data held on the assets
    4. Asset expiration data
    5. Asset recovery time objectives

Paul Hastings’ Data Privacy and Cybersecurity practice regularly advises clients in responding to data breaches and on compliance with Part 500 and other cybersecurity regulations. If you have experienced a breach or have any questions concerning how the changes to Part 500 may affect your organization, please do not hesitate to contact the members of our team listed here.

Contributors

Image: Aaron Charfoos
Aaron Charfoos

Partner, Litigation Department


Image: Michelle A. Reed
Michelle A. Reed

Partner, Litigation Department


Image: Jeremy Berkowitz
Jeremy Berkowitz

Senior Privacy Director and Deputy Chief Privacy Officer


Practice Areas

Data Privacy and Cybersecurity

Privacy and Cybersecurity Solutions Group


For More Information

Image: Aaron Charfoos
Aaron Charfoos

Partner, Litigation Department

Image: Michelle A. Reed
Michelle A. Reed

Partner, Litigation Department

Image: Jeremy Berkowitz
Jeremy Berkowitz

Senior Privacy Director and Deputy Chief Privacy Officer