As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more
2/3/2025
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Employee Training ,
Incident Response Plans ,
Phishing Scams ,
Ransomware ,
Risk Management ,
Social Engineering ,
Third-Party Service Provider
The FBI's Internet Crime Complaint Center (IC3) report sheds light on the growing threat of cybercrime, both nationally and within North Carolina. The state ranks among the top 15 in the U.S. for cybercrime complaints,...more
In today's digital landscape, the exchange of personal information has become ubiquitous, often without consumers fully comprehending the extent of its implications. The recent actions undertaken by the Federal Trade...more
As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages.
Among the great tapestry of age groups, despite the wealth of experience and...more
12/8/2023
/ Best Practices ,
Cybersecurity ,
Data Protection ,
Data Security ,
Enhanced Cybersecurity Services ,
Information Security ,
Internet ,
Mobile Devices ,
Passwords ,
Phishing Scams ,
Scams
The ongoing massive data breach in the world of advertising: real time bidding ("RTB").
You likely are, or have been, a target of RTB without your knowledge. The Irish Council for Civil Liberties ("ICCL") found that the...more
We live in an age where our digital footprint is forever preserved. Even before you think twice about it, your data has been collected and saved.
In fact, in 2020, it was estimated that nearly 2MB of data was generated...more
Data is king in today's digital economy. The estimated net worth of this global data market is forecast to hit nearly $235 billion by 2026, meaning collecting and sharing personal information is big business. ...more
A Ward and Smith attorney, Information Technology professional and Privacy Officer outlined a variety of best practices and tips for businesses dealing with data security and privacy issues.
The webinar, one in a series...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known...more
In just a few short days, on May 25, 2018, supervisory authorities in the European Union ("EU") will begin enforcement of the EU's General Data Protection Regulation ("GDPR").
The GDPR is a regulation enacted by the EU to...more
5/17/2018
/ Breach Notification Rule ,
Cybersecurity ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
EU-US Privacy Shield ,
Federal Trade Commission (FTC) ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Personally Identifiable Information ,
Vendor Contacts
The International Association of Privacy Professionals ("IAPP") is the world's largest information privacy organization.
IAPP provides education, training, and tools to professionals engaged in data privacy and security....more
4/27/2018
/ Artificial Intelligence ,
Blockchain ,
Cybersecurity ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
EU-US Privacy Shield ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Right to Be Forgotten
The countdown has officially begun.
On May 25, 2018, the European Union's ("EU") General Data Protection Regulation ("GDPR"), a sweeping data privacy and security regulation resulting from years of regulatory and political...more
1/9/2018
/ Breach Notification Rule ,
Cybersecurity ,
Data Controller ,
Data Processors ,
Data Protection ,
Data Protection Officers (DPOs) ,
EU ,
EU Data Protection Laws ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Personally Identifiable Information