News & Analysis as of

Passwords Email

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Employee Cybersecurity Awareness Training

Jackson Lewis P.C. on

As Cybersecurity Awareness Month wraps up, it’s worth mentioning that employee security awareness training is an ongoing process. Employee error remains a significant contributing factor in data breaches. According to the...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

Foodman CPAs & Advisors

Identity Theft Do’s And Don’ts To Protect Yourself

Foodman CPAs & Advisors on

The IRS concluded its special summer series with important reminders to tax professionals and taxpayers to protect themselves against Identity theft. The reminders for tax professionals and taxpayers to reduce identity...more

Foodman CPAs & Advisors

Identity Theft And The CPA

On 8/16/22As part of the IRS Security Summit, the IRS presented steps that tax professionals can recommend to help their clients battle identity theft risk. The IRS Security summit is comprised of tax professionals including...more

Foster Swift Collins & Smith

Cybersecurity Month Serves as Reminder to Take Proactive Steps

Whether you are the CEO of a big corporation working in the office six days a week or an analyst working remotely from home entering data, everyone is at risk of a cyber-attack. Despite the fact that all organizations,...more

Wiley Rein LLP

FTC Uses Enforcement Proceeding to Send Message on Account Security Practices

Wiley Rein LLP on

Account security and digital identity have been hot topics for regulators and at the National Institute of Standards and Technology (NIST). The government has been promoting multifactor authentication (MFA) and innovation in...more

Cohen Seglias Pallas Greenhall & Furman PC

A Primer on Pennsylvania’s Digital Assets Act

“What’s that password again? Where did I write these log-ins down again? Was it this password or the one I came up with three years ago?” Consider the daily frustrations we encounter with the bevy of passwords we need for...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

Rivkin Radler LLP

ABA Provides New Guidance On Remote Work For Lawyers

Rivkin Radler LLP on

On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more

White and Williams LLP

Seven Steps to Stay Safe Online in the Workplace

White and Williams LLP on

Ensuring the online safety and security of a workplace is only possible through the joint efforts of all the employees using a company’s computer systems. The failure to maintain a secure network environment can result in...more

K2 Integrity

Too Good to Be True: Cyber Safety Tips

K2 Integrity on

When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersabotage: The Hot Tactic Of Today's Disgruntled Employee

Workplace vandalism is so . . . brick and mortar. An employer recently posted a vacant job online. Some people applied for the jobs, and some of them were African-American women. ...more

Whitman Legal Solutions, LLC

Fraud and Forgery: From Vintage Violins to Today’s Real Estate Transaction

Fraud has a long history. In a recent blog in the Orchestrating Real Estate Series, New Things to Consider in Section 1031 after the Tax Cut and Jobs Act of 2017, I discussed how famous violin maker Jean-Phillipe...more

McManis Faulkner

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #114 – Your Email May Have Been Hijacked and You Don’t Know It

A new study by Google, the University of California Berkeley and the International Computer Science Institute has concluded that email users are being threatened by massive credential theft and phishing schemes are the...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Bass, Berry & Sims PLC

Privacy Perils: Phishing in the Ocean of Apps

Bass, Berry & Sims PLC on

News about phishing attacks implemented through email and websites is very common (see Déjà vu All Over Again; American Express – New Bait for an Old Phishing Lure; Beware of Text Scam, iPhone Users; Beware New Hacker Scheme...more

K2 Integrity

Protecting Your Digital Assets

K2 Integrity on

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Bradley Arant Boult Cummings LLP

What Lawyers Should Know To Avoid Online Scams

According to a February 2017 American Bar Association press release, “cyber-related risks have escalated based on the sensitivity and nefarious uses of that data. Last year, for example, the Manhattan U.S. attorney’s office...more

Snell & Wilmer

Notable New State Privacy and Data Security Laws – Part One

Snell & Wilmer on

States aren’t static when it comes to data privacy and security laws. This is Part One of a two-part series about several new state privacy and data security laws that took effect within the last year. In this article,...more

Morgan Lewis

Three States Join Others to Expand Personal Information Definition to Include Usernames or Email Addresses

Morgan Lewis on

Businesses should take steps to protect usernames, email addresses, passwords, and security questions and answers. A key issue in determining whether notification is required following a data breach is whether...more

Robinson+Cole Data Privacy + Security Insider

Yahoo Announces Another Breach of One Billion Accounts

Yahoo Inc. announced on December 14th that hackers stole the personal information of more than one billion users, which is in addition to the 500 million accounts compromised that was announced in September....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #59 – Check your Privacy Settings on Your LinkedIn Account

I am watching Game 7 of the World Series, and it is the bottom of the 8th and the score is 6-6. It is very difficult to concentrate on this blog post. So I am taking the easy way out and reminding you to check the...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide