News & Analysis as of

Virtual Private Networks

Robinson+Cole Data Privacy + Security Insider

TechRadar’s Cyber Predictions for 2024 are Spot On

Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next year. A year is a long time in the tech field. Just look at how fast ChatGPT...more

Robinson+Cole Data Privacy + Security Insider

Chinese Hackers Allegedly Use ChatGPT to Write Ransomware

Chinese authorities have arrested alleged hackers in what appears to be the first-ever reported case of hackers using AI to develop ransomware. These alleged hackers reportedly used ChatGPT to refine the code for their...more

Foodman CPAs & Advisors

Identity Theft Do’s And Don’ts To Protect Yourself

Foodman CPAs & Advisors on

The IRS concluded its special summer series with important reminders to tax professionals and taxpayers to protect themselves against Identity theft. The reminders for tax professionals and taxpayers to reduce identity...more

Ankura

Is Your DNA Safe? DNA Sequencing Machines Found to Contain Critical Vulnerabilities

Ankura on

Key Points: Illumina DNA sequencing machines are vulnerable to exploitation. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have published advisories urging all...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

Planet Depos, LLC

Security Check in a Digital Era (Updated)

Planet Depos, LLC on

Whether you work from home or in an office building, you have invaluable information on your computer, and somewhere, someone nefarious would love to get at that information. At a time when so many work from home, it is vital...more

K2 Integrity

The Iranian Women’s Movement: Sanctions, Human Rights, and the Targeting of Iran’s Morality Police

K2 Integrity on

Current Situation in Iran - A historic and powerful popular movement—led by women in response to the murder of Mahsa Amini while in the custody of the Iranian Morality Police in mid-September—is currently unfolding in...more

Foodman CPAs & Advisors

Identity Theft And The CPA

On 8/16/22As part of the IRS Security Summit, the IRS presented steps that tax professionals can recommend to help their clients battle identity theft risk. The IRS Security summit is comprised of tax professionals including...more

Kohrman Jackson & Krantz LLP

Workplace Security: Zero Trust Network Access vs. Virtual Private Network

VIRTUAL PRIVATE NETWORKS - Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead...more

Ankura

Everything You Need To Know About India’s New Guidelines Related to Cyber Incident Reporting by CERT-In

Ankura on

On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In), a functional organization under the Ministry of Electronics and Information Technology (MeitY), Government of India issued directions under sub-section...more

Rumberger | Kirk

Hybrid Workplace: Top 10 Things to Consider When Updating Employee Handbook

Rumberger | Kirk on

An Employee Handbook Should Fit the Current Workplace Model - Following Covid-19 shutdowns, many employers have moved to a hybrid workplace, where a section of the employees works remotely for all or part of their...more

Troutman Pepper

Protecting Trade Secrets in a Work-From-Home World

Troutman Pepper on

Q: Do work-from-home arrangements create a heightened risk that company trade secrets may be exposed? ...more

ArentFox Schiff

Class Action Quarterly Update: Privacy and Data Protection

ArentFox Schiff on

Second Circuit Denies Settlement of Data Breach Case Due to Lack of Standing - As we previously reported, in April 2021, the Second Circuit became the latest federal circuit to hold that an individual may establish Article...more

Esquire Deposition Solutions, LLC

Staying Secure in the New Hybrid Workplace

Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more

Woods Rogers

New Developments in the Colonial Pipeline Attack Provide Businesses Good News – And Some Important Lessons

Woods Rogers on

It has been barely a month since we reported on the recent ransomware attack on the Colonial Pipeline Company, yet news continues to break with additional revelations about the recent attack.  What we have learned during the...more

Jackson Lewis P.C.

Can Employers Use Artificial Intelligence And Data Analytics To Track Remote Workers?

Jackson Lewis P.C. on

Notwithstanding federal, state, and local privacy and cybersecurity laws that may apply, employers may generally use artificial intelligence, data analytics, and other software and technologies to track remote workers. The...more

Vinson & Elkins LLP

Think Before You Pack that Laptop—Searches At The U.S. Border May Compromise Personal And Corporate Data

Vinson & Elkins LLP on

A new decision from the First Circuit upholding the federal government’s authority to search the electronic devices of anyone entering the United States — in some instances without a warrant, probable cause, or even...more

Levenfeld Pearlstein, LLC

How To Better Protect Your Business From Cyberattacks

Bloomberg Law recently reported that Goodwin Procter was the latest law firm to fall victim to a data breach after one of its vendors was hacked. Cyberattacks on law firms and businesses have become increasingly common over...more

Husch Blackwell LLP

Private Use Networks & Self-Generation: What You Need To Know

Husch Blackwell LLP on

ERCOT has experienced more attention to and development of Private Use Networks (“PUN”) in the last months and years. This post summarizes what these “islands in the grid” are, their positive attributes, and how to create...more

Faegre Drinker Biddle & Reath LLP

IT Security Trends in the Era of COVID: Our Top Five Tips for Making Your Network Safer in 2021

As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more

Robinson+Cole Data Privacy + Security Insider

New York Department of Financial Services Issues Report on Recent Twitter Hack

You probably heard about the recent hack of Twitter accounts that took place on July 15, 2020. The hackers took over several prominent Twitter accounts, which resulted in a scam that netted over $118,000 in bitcoin for the...more

Robinson+Cole Data Privacy + Security Insider

U.S. Chamber of Commerce and FICO Release Security Guidelines on Telework During COVID-19

It is no secret that companies are experiencing an increase in security incidents following the transition from work in the office to work from home during the pandemic. There are a number of causes, including the difficulty...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #254 – FBI Issues Warning of Using Hotel WiFi if Teleworking from Hotel

On October 6, 2020, the Federal Bureau of Investigations (FBI) issued a warning to consumers about using WiFi when teleworking from a hotel. The FBI acknowledges that many workers are having difficulty working from home...more

Robinson+Cole Data Privacy + Security Insider

FBI + CISA Issue Joint Alert on Vishing Attacks

When the Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) get together to issue an alert to warn us about a security threat, you can bet that the threat is real, and that...more

Sheppard Mullin Richter & Hampton LLP

Cybercrime 2020 – The Rise of “Vishing”

As if 2020 hasn’t caused enough hardship and headaches for employers already, the FBI and U.S. Cybersecurity Infrastructure Security Agency (“CISA”) recently issued a joint Cybersecurity Advisory Alert warning employers about...more

62 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide