No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
New York employers should take note of a new law that recently took effect that impacts their ability to access applicant and employee social media accounts. The law applies to all employers covered by the New York Labor Law...more
New York employers, are you thinking of asking applicants or employees to divulge their personal social media information? Think again. Last September, Gov. Kathy Hochul (D) signed legislation that prohibits all employers in...more
Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more
This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more
With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more
We recently cautioned employers about their confidential information showing up in selfies posted online, but social media is not the only reason employees are taking photos at work. Picture this: An employee quickly...more
Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more
Social Media connects people across the world by providing users with a means to share content. It has undoubtedly become a huge part of our daily routines. In 2021, Americans spent an average of two hours and thirty minutes...more
Account security and digital identity have been hot topics for regulators and at the National Institute of Standards and Technology (NIST). The government has been promoting multifactor authentication (MFA) and innovation in...more
If you’re like most people, you’ve probably encouraged your elderly relatives to list of all their assets and contact information, including passwords to online accounts. This will enable you or other family members to access...more
Pennsylvania recently became one of the last states to enact a law treating digital assets and electronic records as tangible property, which allows executors, trustees, guardians, and agents to access and manage the digital...more
In August 2013, Arkansas enacted a statute intended to regulate employers’ ability to access social media account of employees. This statute, entitled “Social Media Accounts of Current and Prospective Employees,” applies to...more
The digital revolution has touched virtually every aspect of our lives. The result is that one likely has at least a handful of “digital assets.” These assets may include personal assets, such as online bank and brokerage...more
Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more
Online platforms battle the trolls (and ad blockers); Pokemon GO! creator Niantic promises to watch things a bit more closely; blockchain is not as “unhackable” as many think; and more …...more
When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more
Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more
Question: I know my spouse’s passwords to their social media accounts, bank accounts and/or email accounts, can I log into their account and get the information we need to help win my case? ...more
Facebook says that someday ‘the password’ will be a distant memory. But for now, passwords are certainly necessary. However, Facebook has released a beta version of its Delegated Account Recovery software –a new way for...more
Many people have thoughtfully gathered information on the location of their bank accounts, deeds, lock boxes, safe combination, car title (and keys), investment accounts, check books, and other assets to make handling their...more
There has been lots of talk about the ripple effects of the Trump travel ban. But here’s a new twist I hadn’t heard before—U.S. Customs and Border Control (CBP) agents are detaining U.S. citizens and requiring them to unlock...more
Over the holidays, it’s likely that you or a loved one received some type of computer or device that connects to internet websites, e-mail and applications. Or that pictures were taken and stored on such a device, or that...more
A number of new state or local laws are set to take effect in Illinois in 2017 which will require employers to update their employee handbooks, employment agreements, and other policies and procedures. We address the key...more