No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success
No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations
No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Hybrid Workforces and Compliance with Sheila Limmroth
[Podcast] Prioritizing Cybersecurity in a Hybrid Workplace
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
Digital Planning Podcast - Interview With Leeza Garber
Happy Password Day
Zoom Security Best Practices
Data Privacy Legislation, Part 2 (and bonus tips on teleworking from two law mamas who feel your pain!)
Compliance Perspectives: Cybervigilance and Cyber-resiliency
Life With GDPR: Episode 26- The Importance of Passwords
Employment Law This Week: Password Sharing, Organizing Mixed Units, Mental Health Accommodations, Privacy Shield
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
How to Protect Your Company From Hackers
The Basics of Michigan’s Social Media Password Law & Why It Isn’t Such a Great Idea
October was a busy month in New York for cybersecurity enforcement. In addition to a $4.5 million settlement between the New York Department of Financial Services and EyeMed Vision Care (discussed in a forthcoming blog post),...more
New York AG Letitia James warned that more than 1.1 million online accounts were compromised in cyberattacks known as “credential stuffing attacks” at 17 well-known companies and released a guide with recommendations for how...more
Pennsylvania recently became one of the last states to enact a law treating digital assets and electronic records as tangible property, which allows executors, trustees, guardians, and agents to access and manage the digital...more
According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
Information is everywhere, especially in the workplace. But traditional means of securing and sharing data—which typically involve accessing password protected information from various sources—is inefficient, cumbersome, and...more
Verizon recently released its yearly Data Breach Investigations Report and as always, the report is a very informative read. The report gathered information from more than 64,000 security incidents worldwide in 2015, 2,260 of...more
Every morning we sit down at our computers and provide our credentials to the network; user name and password. It has become such a ubiquitous part of modern life, we have a user name and password to everything, we even have...more
With social media pervading all facets of society (no less than 67 percent of Americans are regular users), businesses have long been concerned with their employees’ potentially detrimental social media activities. As these...more
According to a recent report entitled Digital Trust in the IoT Era published by Accenture, 77% of consumers are interested in adopting alternatives to logging in by username and password. While companies using mobile...more
Connecticut has joined a list of twenty-one states with a statute designed to preserve the privacy of personal online accounts of employees and limit the use of information related to such accounts in employment...more
On July 1, 2015, both Nevada and Wyoming’s breach notification law amendments come into force, expanding the definition of Personal Information (“PI”) to include account credentials such as a username or email address. With...more
As we have frequently reported in this blog, social media privacy issues increasingly permeate the workplace. For example, earlier this year, Montana and Virginia joined a growing number of states in enacting laws...more
Following a national trend, Montana and Virginia have become the nineteenth and twentieth states to enact laws restricting employer access to the social media accounts of applicants and employees. Virginia’s law, which...more
Effective July 1, 2015, employers in Virginia will have to comply with a new law limiting their access to employees’ and applicants’ social media accounts. The new law prohibits employers from requiring employees or...more
On April 8, 2014, Governor Scott Walker signed Wisconsin Act 208 to prohibit employers from requiring or requesting that prospective and current employees disclose usernames and passwords for their personal Internet accounts....more
As of January 1, security breach notifications must be provided to consumers when certain account information is compromised. On September 27, California Governor Jerry Brown signed into law Senate Bill No. 46 (S.B....more
On September 27, California Governor Brown once again signed into law a bill amending the state’s breach law (“S.B. 46”). This latest amendment is particularly significant because it represents the first major effort by a...more