Craig Hoffman

Craig Hoffman

BakerHostetler

Contact  |  View Bio  |  RSS

Latest Posts › Cybersecurity

Share:

The BakerHostetler Data Security Incident Response Report 2015

The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more

5/13/2015 - Annual Reports Best Management Practices Cybersecurity Data Breach Data Protection Risk Assessment Risk Mitigation

Cybersecurity is a Real Risk, So Become “Compromise Ready”

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

4/30/2015 - Best Practices Corporate Counsel Cyber Threats Cybersecurity Popular Risk Assessment Risk Mitigation Security and Privacy Controls

FCC Plans $10 Million Cybersecurity Fine Against Two Telecoms

On October 24, 2014, the Federal Communication Commission (“FCC”) took a big step into the cybersecurity regulatory space when it announced its intent to assess a $10 million fine against two telecoms, TerraCom and YourTel...more

10/31/2014 - Civil Monetary Penalty Cybersecurity FCC Fines Privacy Policy Telecommunications

Secret Service Raises Warning About Backoff POS Malware

The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more

8/25/2014 - Cyber Attacks Cybersecurity Data Protection Debit and Credit Card Transactions Malware Passwords Point of Sale Terminals Popular Risk Alert

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

2/22/2013 - China Critical Infrastructure Sectors Cyber Attacks Cyber Espionage Cybersecurity Cybersecurity Framework Identity Theft Trade Secrets

Do Merchants That Outsource Payment Processing Still Have Risk From a Breach?

Last week a small New England bakery announced that its point-of-sale (POS) devices were infected with malware that may have put card data at risk....more

2/11/2013 - Credit Cards Cybersecurity Data Breach Data Protection Debit and Credit Card Transactions Notice Requirements Notifications PCI PFI

6 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×