News & Analysis as of

Passwords

Are You Doing Enough to Protect Your Company's Secrets?

by Fisher Phillips on

A decade ago, I litigated a trade secret/unfair competition dispute between two large plastics manufacturers. The Plaintiff was based in southwest Florida, the Defendant in southern Alabama. The factual dispute is...more

FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)

by Patrick Law Group, LLC on

Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk. Although the...more

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

by Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

Protecting Your Digital Assets

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

When Technology Becomes Weaponized and the Target is You

by Shipman & Goodwin LLP on

“Technology is a wonderful thing but it’s scary when it’s weaponized against you.” The first sign that my wife’s identity and my own were under attack came innocently enough....more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Passwords

by Bryan Cave on

Passwords have become ubiquitous such that many consumers, and many employees, may have dozens of passwords that permit them to access dozens of different systems, services, networks or terminals. From a corporate...more

Illinois takes the lead on employee privacy: What employers need to know

by Thompson Coburn LLP on

When it comes to employee privacy protection, employees in the United States generally do not have a right to privacy in their workplace. By contrast, members of the European Union recognize employee rights to privacy and...more

Here’s a Factor That Can Reduce the Potential for Account Hacks: Cybersecurity Best Practices

by CloudNine on

The data breaches just keep coming.  Equifax is the latest hacking victim to a tune of 143 million US customers – approximately 44 percent of the population.  Perhaps if they, and other organizations recently breached, had...more

Protecting Your Privacy Online Is Possible

Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more

Getting Divorced? Four Cautionary Tips about Accessing Your Spouse’s Electronic Information

by Jaburg Wilk on

Question: I know my spouse’s passwords to their social media accounts, bank accounts and/or email accounts, can I log into their account and get the information we need to help win my case? ...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Privacy Tip #102 – How to Educate Your Employees to Use Long, Easy to Remember Passwords

I feel like I have been writing about Passwords over and over and that’s because I have. Despite hearing about how important passwords are over and over again, compromised passwords continues to be an issue for organizations....more

NIST Publishes Updated Cybersecurity Guidance and Guidance on Passwords

The National Institute of Science and Technology (NIST) has long been a leading authority in Cybersecurity—even before Cybersecurity became a household name. It originally published its Cybersecurity Framework-intended not...more

NIST Issues New Password Security Recommendations: Keep It Simple, Long And Memorable

by Fox Rothschild LLP on

The United States National Institute for Standards and Technology (NIST) has issued new guidelines for creating secure passwords. NIST guidelines, which are directed to “federal government systems,” often become best...more

Retired NIST Expert Says His Advice on Creating Passwords was Wrong: Cybersecurity Best Practices

by CloudNine on

If you’re a person who takes password security seriously and followed advice to create passwords that use a combination of lower and upper case letters, numbers and special characters to foil hackers, good for you. ...more

The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!

Great article in the Wall Street Journal this week (paywall), on the history of passwords and password management. I did not know that the seeming obsession with passwords featuring a strange mixing of capital letters,...more

The Data Report Episode 6: The Power of Passwords

by Bilzin Sumberg on

Module Two: Secure Your Data (Part II) In this episode of The Data Report, Litigation attorney Jay Ward discusses the importance of implementing a robust password protocol. A complex password has a powerful effect on how...more

Six Ways to Improve Cybersecurity Policies and Procedures

The SEC has declared cybersecurity to be an examination priority for financial institutions (i.e., broker-dealers, investment advisers, and registered investment companies) in each of the past four years. While the SEC’s...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Cybersecurity – A Recent UK ICO Fine Provides 60,000 Reasons for Organisations to Review Data Security

by Ropes & Gray LLP on

On 27 June 2017, the Information Commissioner’s Office issued a £60,000 fine to a company hit by a cyberattack along with a warning to all SMEs to ensure that they are doing all they can to safeguard their customers’ personal...more

What Lawyers Should Know To Avoid Online Scams

According to a February 2017 American Bar Association press release, “cyber-related risks have escalated based on the sensitivity and nefarious uses of that data. Last year, for example, the Manhattan U.S. attorney’s office...more

Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends

by CloudNine on

I’ve referred to last year’s Verizon Data Breach Investigations Report (DBIR) in several webcasts lately (including this one) and realized that this year’s report should have already come out by now. Sure enough it has,...more

348 Results
|
View per page
Page: of 14
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.