Latest Publications

Share:

Can Hackers be Ethical, not Evil?

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

Protect Your Municipality from Ransomware Attacks

From big cities and small cities to school districts and beach towns, more than 40 municipalities have been the victim of a cyberattack this year. The New York Times described the season that ended on Monday as a “summer of...more

SHIELD Act Requires Data Compliance Programs to Protect Privacy of New York State Residents

Last week, Governor Cuomo signed the SHIELD Act into law. As a result, organizations that maintain private information concerning New York state residents will have to develop compliance programs before the law becomes...more

Six Steps To Take Immediately After You Suspect Wire Fraud

Wire fraud is on the rise. Health care providers engaging in transactions, whether operational or financial, need to remain aware of crimes involving compromised emails and fraudulent wire transfers....more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide