The dramatic interruption of business processes resulting from the COVID-19 pandemic has revealed major inadequacies in the disaster recovery / business continuity policies of many organizations, both large and small....more
6/4/2020
/ Coronavirus/COVID-19 ,
Cyber Attacks ,
Cybersecurity ,
Hackers ,
Infectious Diseases ,
Phishing Scams ,
Public Health Emergency ,
Re-Opening Guidelines ,
Small Business ,
Social Distancing ,
Workplace Safety
A boom in automobile technology and connectivity in 2018 further boosted expectations of consumers regarding the integration and functionality of their devices and vehicles. Automobile manufacturers have responded by...more
2/22/2019
/ Automotive Industry ,
Connected Cars ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Federal Trade Commission (FTC) ,
Information Technology ,
Manufacturers ,
Motor Vehicles ,
NHTSA ,
Popular ,
Privacy Concerns ,
Regulatory Oversight ,
Risk Mitigation
Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more
Since President Trump’s inauguration, cybersecurity has been in the news almost daily – often on the front page. The U.S. Government is facing a wide array of challenges in cybersecurity, impacting both domestic and foreign...more
5/2/2017
/ Chief Information Security Officer (CISO) ,
Corporate Counsel ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
EU-US Privacy Shield ,
Federal Trade Commission (FTC) ,
National Security ,
Obama Administration ,
Popular ,
Public Private Partnerships (P3s) ,
Securities and Exchange Commission (SEC) ,
Trump Administration
A recent study by a well-known information security company captures one of the most common information security fallacies: that information security is a technology problem. Most businesses view mitigating information...more
As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more
5/26/2016
/ Cyber Attacks ,
Data Protection ,
Data Security ,
Email ,
Employee Training ,
Hackers ,
Health Care Providers ,
Hospitals ,
Phishing Scams ,
Popular ,
Ransomware ,
Social Media ,
Websites
Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more
7/24/2015
/ Automotive Industry ,
Cloud Computing ,
Cyber Attacks ,
Cybersecurity ,
Dashboard ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Federal Trade Commission (FTC) ,
Hackers ,
Internet of Things ,
NHTSA ,
Personally Identifiable Information ,
Proposed Legislation ,
Safety Standards ,
Transparency ,
Wireless Technology
Given the exponential rise in security breaches and hacking activity in past few years and the almost constant headlines in the press of yet another major security breach, information security should be a front burner issue...more