Internet of Things Data Breach

News & Analysis as of

Ten Things You Need To Know About Ransomware

In 2013, hackers attacked a venerable Swansea, Massachusetts institution via ransomware. Ransomware is software that locks users out of computers or specific files until the victim pays a “fee” to release the lock. Such...more

Cyber Attacks Reach Subrogation

It was just a matter of time. As cyber-attacks rose and the data security breaches became increasingly devastating to businesses and individuals, cyber breach insurance became more prevalent. And where insurance appears,...more

"Privacy & Cybersecurity Update - June 2016"

In this edition of our Privacy & Cybersecurity Update, we examine the impact of Brexit on EU data protection, court rulings on cyber insurance policy exclusions and coverage gaps, recent statements from the FTC and the...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

U.S. House Committee On Homeland Security Holds Hearing On States’ Preparation For Cyber Threats

On Tuesday, May 24, 2016, the U.S. House Committee on Homeland Security (the “Committee”) held a hearing titled “Enhancing Preparedness and Response Capabilities to Address Cyber Threats.” The hearing was convened jointly by...more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

The Case of the Hacked Hospital: When a Cyber Breach Becomes a Health Crisis

Recently, we noted vulnerability issues from use of the Internet of Things and how that has come to impact the health industry. Recent events continue to highlight this development. Since the start of the year, there have...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Advertising Law - December 2015 #4

Copper-Infused Apparel Company Settles With FTC for $1.4M - Tommie Copper, Inc. and company founder Thomas Kallish reached a deal with the Federal Trade Commission to settle charges that they misled consumers by claiming...more

Eight privacy issues Israeli companies should think about

Israeli companies are growing at an exponential rate. As they continue to expand globally, they need to be mindful of the ever-expanding worldwide network of data privacy laws and regulations. It is critical that Israeli...more

ALM cyberSecure Primer: Investment Opportunities, Internet of Things, Cybersecurity ABCs, Stakeholders...

Must-read cybersecurity commentary and analysis from the event primer for ALM's upcoming cyberSecure conference, Dec 15 & 16th in New York City. In this issue: ABC's for the C-suite, cyber risk stakeholders and why they...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Consumer Trust should be at the heart of the Digital Economy

A recent report summary produced by the Organisation for Economic Cooperation and Development (‘OECD’) highlighted that many countries are placing too much emphasis on developing their digital economies and are neglecting the...more

The Legal Lessons of Data Breaches

Every business would love to find a fortune teller to give it insight into what trends to follow, which risks to take, and when “exposure” will convert to liability. Some clients might say that, unfortunately, their lawyers...more

That is SO last week - September 2015 #4

No matter how many times employment lawyers say that the ADA may require employers to provide more leave than the FMLA’s 12 week allotment, some just don’t get the message. Last week, the EEOC announced a $300,000 settlement...more

Why Federal and State Agencies are Considering Converting from a “Gallons Consumed” to a “Road Usage” Tax – And What are the Risks...

This Change, It’s a Coming (Maybe) - Many states and the federal government are seriously considering converting from a “gallons consumed” tax levy to a “miles driven” program for determining gasoline tax. There are...more

The Internet of Things and the Inevitable Collision with Products Liability PART 3: Initial Contact

This is the third in a series of blogs examining the rapid development of the Internet of Things (IoT) and its consequential impact on product liability risk. The development of the IoT has been so rapid and the applications...more

Cyber risk: Why cyber security is important - We live in an increasingly networked world, from personal banking to government...

Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy. The Global Risks 2015 report,...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Privacy & Cybersecurity Update - May 2015

In This Issue: - Second Circuit Rules Patriot Act Does Not Authorize Bulk Metadata Collection; Congress Reconsiders Certain Patriot Act Authorities - SEC Issues Cybersecurity Guidance for Investment Companies...more

Sports, Media and Entertainment Intelligence - May 2015 (Global)

COPYRIGHT - Belgium: Even a world famous painter needs to respect copyright - It has been held that the well-known Belgian painter Luc Tuymans breached professional photographer Katrijn Van Giel's copyright through his...more

Privacy & Cybersecurity Update - March 2015

In This Issue: - Dismissal in P.F. Chang’s Data Breach Case Shows Challenge Plaintiffs Face in Such Actions - Eleventh Circuit Court of Appeals Decision Underscores the Need to Evaluate Insurance Programs for Cyber...more

34 Results
|
View per page
Page: of 2
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×