News & Analysis as of

Passwords

NIST Issues New Password Security Recommendations: Keep It Simple, Long And Memorable

by Fox Rothschild LLP on

The United States National Institute for Standards and Technology (NIST) has issued new guidelines for creating secure passwords. NIST guidelines, which are directed to “federal government systems,” often become best...more

Retired NIST Expert Says His Advice on Creating Passwords was Wrong: Cybersecurity Best Practices

by CloudNine on

If you’re a person who takes password security seriously and followed advice to create passwords that use a combination of lower and upper case letters, numbers and special characters to foil hackers, good for you. ...more

The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!

Great article in the Wall Street Journal this week (paywall), on the history of passwords and password management. I did not know that the seeming obsession with passwords featuring a strange mixing of capital letters,...more

The Data Report Episode 6: The Power of Passwords

by Bilzin Sumberg on

Module Two: Secure Your Data (Part II) In this episode of The Data Report, Litigation attorney Jay Ward discusses the importance of implementing a robust password protocol. A complex password has a powerful effect on how...more

Six Ways to Improve Cybersecurity Policies and Procedures

The SEC has declared cybersecurity to be an examination priority for financial institutions (i.e., broker-dealers, investment advisers, and registered investment companies) in each of the past four years. While the SEC’s...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Cybersecurity – A Recent UK ICO Fine Provides 60,000 Reasons for Organisations to Review Data Security

by Ropes & Gray LLP on

On 27 June 2017, the Information Commissioner’s Office issued a £60,000 fine to a company hit by a cyberattack along with a warning to all SMEs to ensure that they are doing all they can to safeguard their customers’ personal...more

What Lawyers Should Know To Avoid Online Scams

According to a February 2017 American Bar Association press release, “cyber-related risks have escalated based on the sensitivity and nefarious uses of that data. Last year, for example, the Manhattan U.S. attorney’s office...more

Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends

by CloudNine on

I’ve referred to last year’s Verizon Data Breach Investigations Report (DBIR) in several webcasts lately (including this one) and realized that this year’s report should have already come out by now. Sure enough it has,...more

Privacy Perils: Little White Lies

by Bass, Berry & Sims PLC on

We harp on the importance of strong passwords, but for good reason. Unless you want to live off the grid, protecting the security of your online accounts and data is paramount. For instance, previously we have recommended the...more

Littler Global Guide - Philippines - Q1 2017

by Littler on

Persons With Disabilities May Now Be Declared as Dependents for Tax Purposes - Enacted Legislation - Republic Act No. 10754, enacted on March 23, 2016 and effective on December 23, 2016, expanded the benefits of...more

Update: Case Involving Sharing Of Passwords May Be Headed To The Supreme Court

by Jackson Lewis P.C. on

Last August, we reported on a Ninth Circuit case in which a former employee was convicted of a crime under the Computer Fraud and Abuse Act (“CFAA”) for accessing and downloading information from his former company’s database...more

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Coming Soon: Two-Factor Authentication for Social Security Website

by BakerHostetler on

The Social Security Administration recently announced that beginning June 10, two-factor authentication will be required for all account holders logging into the “My Social Security” portal. To comply with this new rule,...more

Hacker Hits HipChat—Reset Passwords

An unknown intruder was able to access team communication platform HipChat last weekend, allowing access to the account information of users, including email addresses, hashed passwords and names. There is also a chance that...more

Facebook’s New Software Suggests Passwords May One Day be Obsolete

Facebook says that someday ‘the password’ will be a distant memory. But for now, passwords are certainly necessary. However, Facebook has released a beta version of its Delegated Account Recovery software –a new way for...more

Privacy Perils: The Untimely Death of Digital Data

by Bass, Berry & Sims PLC on

Many people have thoughtfully gathered information on the location of their bank accounts, deeds, lock boxes, safe combination, car title (and keys), investment accounts, check books, and other assets to make handling their...more

Hackers, Keep Out!

by McManis Faulkner on

Hackers are getting more sophisticated each day. It is our job to try and stay a step ahead of them. There is always someone on the outside trying to get in. It is imperative to keep your data secure within your business...more

On the Border: Lawmakers Seek to End Warrantless Searches of Electronic Devices by Border Authorities

by Snell & Wilmer on

The controversial practice of U.S. Customs and Border Protection (CBP) agents randomly demanding that Americans turn over passwords to their mobile devices so they can be searched at the border and at ports of entry may be...more

Privacy Tip #81 – LastPass Users—Listen Up!

People always ask me if I use a password manager. The answer is no. I am too paranoid to put all of my passwords in one place. Instead, I prefer to use variations on complex pass phrases that I can remember and I change them...more

Cyber Update: Five Tips from the Front Lines of Practice to Limit Your Company’s Losses from a Breach

by Carlton Fields on

We help companies prepare for, respond to, and clean up data breaches and related events. We are lawyers, but in this role, we often look over the shoulders of cybersecurity technical experts, who are advising companies on...more

Border Searches of Your Electronic Devices — What Rights Do You Have?

by Foley Hoag LLP on

The United States government has reported that border searches of electronic devices in the U.S. increased from 4,764 in 2015 to 23,877 in 2016. Because electronic devices have immense data storage capacity and can hold...more

Immigration Fact or Fiction for the U.S. Employer: CBP Searching Electronic Devices – A New Thing?

There has been heightened interest and concern regarding the potential for U.S. Customs and Border Protection (CBP) to search laptops and smart phones at the port of entry, due to the mention of such searches in one of...more

Fiduciary Access To Digital Assets

by Pessin Katz Law, P.A. on

I don’t need to tell you that social media has become a mainstream way to communicate ideas, photos, and information. Even the President uses this technology as a prime form of expression. Have you considered what happens to...more

Privacy Tip #74 – What to Do About Customs and Border Patrol

There has been lots of talk about the ripple effects of the Trump travel ban. But here’s a new twist I hadn’t heard before—U.S. Customs and Border Control (CBP) agents are detaining U.S. citizens and requiring them to unlock...more

331 Results
|
View per page
Page: of 14
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.