News & Analysis as of

Hackers Data Protection

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

Wednesday’s ILTACON 2017 Sessions: eDiscovery Trends

by CloudNine on

As noted Monday and yesterday, the International Legal Technology Association (ILTA) annual educational conference of 2017 (otherwise known as ILTACON) is happening this week and eDiscovery Daily will be reporting this week...more

Cyber Insurance Primer

by Butler Snow LLP on

The number of reported U.S. data breaches tracked through June 30, 2017 hit a half-year record high of 791. This represents a significant jump of 29% over 2016 figures during the same time period. At this pace, it is...more

Hackers Target U.S. Power Plants, Including Kansas Nuclear Facility

by King & Spalding on

According to a June 2017 joint report issued by the Department of Homeland Security (“DHS”) and the Federal Bureau of Investigation (“FBI”), hackers penetrated the computer networks of at least a dozen U.S. power plants...more

How the U.S. Healthcare Sector Can Prepare for and Harden Its Systems Against Cyberattack

by Hogan Lovells on

“The number one issue on the minds of many CEOs and boards is cyberattacks and data breaches,” said Hogan Lovells partner Marcy Wilder. In this hoganlovells.com interview, Wilder discusses three key things health sector...more

Hackers Could Target Airports, Planes, Satellites, Ships, Cars, and Trains

Cybersecurity for critical infrastructure continues to be of concern, including the transportation sector. A new study by ABI Research concludes that although the transportation sector continues to increase spending on...more

Senate Introduces the Internet of Things (IoT) Cybersecurity Improvement Act of 2017 for Government-Acquired IoT Devices

by Balch & Bingham LLP on

On August 1, 2017, the Senate introduced the “Internet of Things (IoT) Cybersecurity Improvement Act of 2017”, which aims to bolster the security of government-acquired IoT devices. Sponsored by Sens. Mark Warner (D-VA),...more

Senate Bill Tackles Threat From Poorly Secured IoT Devices

by Fox Rothschild LLP on

A bipartisan group of Senators wants to make it more difficult for hackers to enlist smart thermostats, wireless security cameras and other connected devices in future cyberattacks. ZDNet reports that Sens. Mark Warner...more

A real estate broker’s guide to avoid being a victim of cyber fraud

by Shutts & Bowen LLP on

The headline’s become all too familiar: “Cyber thief hacks real estate broker’s email, steals retired couple’s nest egg,” or something similar. The past few years have seen a dramatic increase in such incidents, with the FBI...more

If You SEC Something, Say Something

Just about every survey of General Counsels reveals the same #1 culprit of sleepless nights….. a cybersecurity hack. If you run a business in today’s global environment, it is hard to escape the fundamental reality that it is...more

Follow the Money and Beware the Extra “L”: First Department Sustains Claims against Fund Administrator After Hackers Grab Millions

A legal feud is underway between the world’s biggest hedge fund administrator and a former client over an email scam that resulted in hackers stealing millions in client funds. And not surprisingly, the time-honored...more

General Data Protection Regulation

by Revision Legal on

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it...more

Unusual IoT Hacking Shows Creativity of Hackers

Everything connected to the Internet is hackable and at risk. But there are some things connected to the Internet that you just don’t think of as risks to an organization. That is, until now. Darktrace has issued its report...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

by Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Privacy Tip #97 – Send Your Kid to Cyber Camp This Summer

I have lamented repeatedly that we have a dearth of cyber talent in the U.S. to meet the needs of employers. Many of our clients recruit talent from other countries in order to meet their cyber needs. The need continues to...more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

National Cyber Security Alert

by Clark Hill PLC on

The continuing increase of cyber-crime and the almost daily reports of hacking attacks against businesses, government agencies, and citizens highlight the persistence of this escalating national security and corporate threat....more

Law Firms’ Data Duty: Protecting Client Information From Cybercriminals

by McGuireWoods LLP on

July 1, 2017 The impact from the recent Petya/NotPetya ransomware attack — or what was reported as a ransomware attack but now appears to be something even more damaging — continues to spread around the globe, with several...more

Class Action and Regulatory Settlements Reflect the Rising Cost of Data Breaches

by Carlton Fields on

As the number of data breaches continues to increase, so too do the costs. After a breach occurs, companies typically expend significant sums conducting investigations, notifying customers and regulators, and engaging in...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

What’s Trending in eDiscovery?

by Conduent on

The first half of 2017 has been a busy one for courts adjudicating matters relating to eDiscovery. This includes more rulings on predictive coding and a solid trend line pointing to an underlying question in complex,...more

Health Care Data Breaches Cost $380 per Record

A new study issued by Ponemon Institute, sponsored by IBM, reveals that healthcare data breaches still cost more than in other sectors. The Ponemon Institute’s calculation is that the average healthcare data breach costs...more

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

Ponemon Institute Study on Costs of Data Breaches Highlights Improvement and New Risks for U.S. and Global Companies

by Ballard Spahr LLP on

The average cost of a data breach, on both an aggregate and a per-record basis, has decreased slightly according to the Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview. In addition to presenting recent...more

375 Results
|
View per page
Page: of 15
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.