Robinson & Cole LLP

The headlines of hacking incidents against counties, cities and towns are racking up like the retail space was several years ago. The hackers have targeted state and municipalities to wreak their havoc. This week, Orange County, NC was hit with a ransomware attack that brought it to its knees. As a result of the attack, the entire county computer network was shut down, which meant that the Register of Deeds could not process real estate…
I came across an article last week that indicated there was a successful attack on Microsoft’s Office 365 and Google’s G Suite environments that was able to bypass multi-factor authentication (MFA). However, after reading the article it was immediately clear the attack leveraged an old protocol, IMAP (Internet Message Access Protocol), which does not support MFA. So, yes, technically the hackers bypassed MFA, but I personally wouldn’t say they beat MFA. This got me thinking…
So this week’s blog article takes a page from my very own “smart” home devices. Monday morning at about 3:42 a.m. our entire household woke up because every “smart” lightbulb in the house came on at the same time! It was a bit distressing and once we got up and shut off all the lights, some of us (me!) couldn’t get back to sleep. What if my “smart” light bulbs and/or home Wi-Fi somehow got…
On the heels of working with clients on compliance with the European Union’s General Data Privacy Regulation (GDPR) and the rapidly evolving landscape of data privacy and security laws and regulations, the next hurdle to set compliance sights on for organizations is the California Consumer Privacy Act (CCPA). We have previously outlined the requirements of the CCPA in several posts [view related posts]. Now is the time to be thinking about, assessing and determining…
Unmanned aerial systems (UAS or drone) operators will now face stricter oversight and inspections by local Flight Standards District Offices (FSDO) under the new National Policy issued by the Federal Aviation Administration (FAA). The Policy requires FSDOs to immediately update their 2019 National Work Program Guidelines to include new Required Surveillance Work Activities. Before the FAA’s issuance of this notice, FSDO’s requirements for conducting surveillance of UAS activities was much more limited. However, over the…
In the midst of unending robocalls, news of big tech companies collecting, using and monetizing consumers’ information, and hackers and scammers, we forget that anyone is doing anything to protect our privacy. Only somewhat comforting against that backdrop is the Federal Trade Commission’s (FTC) annual report on its privacy and security work, which was released last week. The 2018 Privacy and Data Security Update, outlines all of the enforcement actions the FTC concluded in…
The Planning and Law Division (PLD) of the American Planning Association is pleased to host the upcoming webcast How Land Use and Natural Resource Regulations are Shaping the Legal Cannabis Industry on Thursday, March 21, 2019 from 2:00 – 3:30 p.m. EST.  The program will explore how various land use and natural resource regulations shape the development of the legal cannabis industry. The scope of the conversation will range from regulatory options municipalities may consider as the…
The United States Department of Labor finally published its proposed regulation raising the minimum salary to be paid under the “white collar” exceptions to the Fair Labor Standards Act.  To refresh your recollection, virtually every worker must be paid at least minimum wage (currently $7.25 per hour under federal law, with many states having a higher minimum wage) and overtime for all hours worked in excess of 40 hours per week.  Certain employees are “exempt”…
Security researchers at Adversis have discovered that dozens of companies have inadvertently leaked corporate and customer data through their Box enterprise storage accounts because staff are sharing public links to their private corporate files. According to the researchers, data stored in Box enterprise accounts is private by default, but if users share the files or folders, the data can be publicly accessible. The researchers found that when they used a script to scan for Box…
Cities and towns continue to be a profitable target for successful ransomware attacks. As we previously reported [view related posts], the list of cities and towns getting hit with ransomware attacks continues to grow. Last week, Jackson County, Georgia admitted that it paid hackers $400,000 to obtain access to its information that was locked down by a ransomware attack. The ransomware attack locked agencies out of almost all of their systems, including the sheriff’s…