If they have not already, employers should take steps now to properly protect the personal information of their employees. The Eleventh Circuit Court of Appeals’ decision in Ramirez v. Paradies Shops, LLC clarifies that...more
8/29/2023
/ Corporate Counsel ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
Data Protection ,
Employee Privacy Rights ,
Employer Liability Issues ,
Information Governance ,
Personal Data ,
Popular
By now, you have heard many news stories about debilitating cyberattacks that started with the compromise of a vendor's systems and ultimately wreaked havoc on that vendor's customers. As a result, many businesses are seeking...more
Please see full Infographic for more information....more
Has your business considered what obligations you would have to notify people in the event of a cyber-attack that compromises some or all of your IT systems? Have you cataloged all the data you collect and where it is stored...more
12/10/2021
/ Breach Notification Rule ,
Cyber Attacks ,
Data Breach ,
Data Management ,
Data Protection ,
Emergency Response ,
FDIC ,
Gramm-Leach-Blilely Act ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Technology ,
Personally Identifiable Information ,
State Data Breach Notification Statutes
It is hard to find a news post without a story on a ransomware attack. The National Security Council has issued an open letter warning all businesses to be alert and prepared for ransomware attacks. Various industry groups...more
6/22/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cyberforensics ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
Incident Response Plans ,
Information Technology ,
Policies and Procedures ,
Popular ,
Ransomware ,
Threat Management
Ransomware attacks have increased over the last several months, but the nation state attacks identified over the last several days are causing people to take a harder look at their systems and what they can do to protect...more
12/15/2020
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Information Technology ,
Personally Identifiable Information ,
Ransomware ,
Risk Management ,
SolarWinds ,
Vulnerability Assessments
Best Practices to Detect and Prevent File-Less and Click-Less Malware -
Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more
5/31/2018
/ Best Practices ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
Hackers ,
Malware ,
New Legislation ,
NIST ,
Risk Mitigation ,
State Data Breach Notification Statutes
On March 28, 2018, Alabama adopted a data privacy law, the Alabama Data Breach Notification Actof 2018 (SB318). While Alabama is one of the last states to adopt such an act, the Act is notable in its requirements, and applies...more
4/12/2018
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Hackers ,
New Legislation ,
Notice Requirements ,
Personally Identifiable Information ,
Risk Management ,
State and Local Government ,
State Data Breach Notification Statutes
Starting on Friday, May 12th , computers in countries around the world have fallen victim to the latest ransomware attack. As of Monday morning, it is estimated that more than 150 countries have infected systems, totaling...more
5/16/2017
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Email ,
Hackers ,
Health Care Providers ,
Personally Identifiable Information ,
Phishing Scams ,
Ransomware ,
Risk Management