Sharon Klein

Sharon Klein

Pepper Hamilton LLP

Contact  |  View Bio  |  RSS

Latest Posts › Cybersecurity

Share:

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

5/14/2014 - Compliance Cybersecurity Data Breach Data Protection Microsoft Technology

2014 Verizon Report Offers Advice For Combatting Nine Common Threats To Cybersecurity

The 2014 Verizon Data Breach Investigations Report (DBIR) was released on April 22, providing the deep empirical analysis of cybersecurity incidents we’ve come to expect from this annual report. The primary messages of this...more

5/14/2014 - Cyber Attacks Cybersecurity Debit and Credit Card Transactions Internet Payments Mobile Payments Target Verizon Websites

SEC Issues Cybersecurity Initiative Risk Alert

On April 15, the U.S. Securities and Exchange Commission (SEC)’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert on its Cybersecurity Initiative. The Alert is intended to provide additional...more

4/29/2014 - Cybersecurity Data Protection OCIE SEC

Privacy And Data Security For Life Sciences And Health Care Companies

Pepper Hamilton Health Care-Life Sciences Webinar - The explosion of mobile technology and Web applications linking patients with doctors, pharmacies and medical devices is undergoing scrutiny by the FDA, FTC, HHS and...more

2/14/2014 - Compliance Cybersecurity Data Protection FDA FTC Healthcare HHS Life Sciences Mobile Devices Privacy Laws Technology

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA ADEA Bring Your Own Device Cybersecurity Data Breach Data Protection Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA Bring Your Own Device Cybersecurity Data Breach Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

8/23/2013 - Cloud Computing Cybersecurity Data Breach Data Protection NIST

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

8/1/2013 - Attorney Generals Cybersecurity Data Breach Data Protection Encryption Notice Requirements Personally Identifiable Information

Unhack My Heart: FDA Issues Guidance To Mitigate Cybersecurity Threats In Medical Devices

A new guidance document from the FDA lists considerations and suggested steps to reduce the likelihood of cybersecurity breaches in medical devices....more

6/24/2013 - Cybersecurity Documentation FDA Medical Devices Security and Privacy Controls Software

NIST Proposes Privacy Control Roadmap For Organizations

In an age in which safeguarding the privacy of a person’s information is becoming increasingly challenging, the National Institute of Standards and Technology (NIST) encourages organizations to devote time and resources to...more

6/14/2013 - Cybersecurity Data Protection HIPAA HITECH NIST Personally Identifiable Information Risk Mitigation

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

3/15/2013 - Barack Obama China Critical Infrastructure Sectors Cyber Espionage Cybersecurity Data Protection National Security Trade Secrets

Executive Order Begins Process Of Strengthening Nation’s Cybersecurity And Critical Infrastructure

During his State of the Union address on February 12, 2013, President Barack Obama announced his signing of a long-anticipated Executive Order on cybersecurity. After months of discussions with technology companies the...more

2/22/2013 - Barack Obama CISPA Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework DHS Executive Orders Infrastructure NIST Voluntary Standards

12 Results
|
View per page
Page: of 1