You are in a fantasy football league registered under your email and your password. Unbeknownst to you, however, the league’s site has been breached, and access credentials have been stolen. The site discovers the breach, investigates the breach, and gives
Cybersecurity Legal Trends & Topics
Patch early, patch often!
Latest from Cybersecurity Legal Trends & Topics - Page 2
When proactive measures fail, the kill chain may still help recapture miswired funds
The “kill chain” is a phrase that refers to the FBI’s ability to interrupt or kill the miswiring and loss of funds.
This is an extremely powerful resource given that cyber criminals have been targeting entities that use Microsoft Office…
Not in California? Here’s Why the CCPA Should Still Be on Your Radar
Even if your business is based on the East Coast, you are likely to feel the effects of the California Consumer Privacy Act (“CCPA”), which will be effective January 1, 2020.
CCPA applies to for-profit businesses that:
- Do business in
…
The Long Reach of New York’s SHIELD Act
States continue to pass legislation addressing the protection and breach of private information and, on July 25, 2019, New York joined the growing trend when Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security Act (or “SHIELD…
The Pros and Cons of Online Meeting Platforms
After 9/11, many companies restricted corporate travel and began embracing online conferencing resources – whether by telephone, video or otherwise.
Now, Webex, Zoom and other similar services are bringing people into the same (virtual) room to facilitate collaboration and negotiation…
States Across U.S. Rush to Implement Data Privacy Regulations
In the continuing void at the federal level, more and more states are being proactive in adopting legislation that seeks to protect US residents’ personal data, and to impose stricter guidelines on companies that experience a data breach.
Although Washington…
Wipro Breach: What to do now
Wipro, one of the world’s largest outsourcing companies, has confirmed that it was the subject of a cyberattack and that its attackers used – and may be continuing to use – access to Wipro’s systems to launch phishing campaigns against…
Responding to, and managing the risk of, the inevitable data breach
Cybersecurity and data privacy remain at the top of the corporate agenda, and it is critical that executives stay ahead of the curve with the latest best practices in order to effectively respond when – not if – an data…
Biometrics: A Data Analytics Treasure Trove or a Lawsuit in the Making?
The time for businesses to wait until they are breached to respond to data vulnerabilities is coming to an end. While 50 states have breach notification statutes (reactive legislation), more than 25 states have now adopted some form of proactive…
Ten Cybersecurity Tips for Safer Travels
From a cybersecurity and data protection perspective, traveling safely on business or pleasure is not an easy task. But if you are mindful of what you do, and where you do it, you and your information can travel more securely.…