Sovereign nation states have been behind (or suspected of being behind) some of the worst cyberattacks. When a cyberattack has state involvement, the inevitable question is whether it constitutes an act of war. The answer can...more
Social engineering scams seeking to deceive companies into making wire transfers to fraudulent bank accounts continue to plague companies. According to the FBI, social engineering fraud costs businesses billions of dollars...more
Recent events and the decline of the global economy have brought a raft of notices of late payments or no payments for creditors, lenders, landlords, and trade counterparties. In many instances there may be no notice at all,...more
In January of this year, New York passed the Child Victims Act. Previously, the state required that childhood sexual abuse suits be filed before a plaintiff’s 23rd birthday. The CVA includes a one-year period, known as a...more
The WannaCry and NotPetya computer viruses that infected computer systems around the world in 2017 sounded a wake-up call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies and...more
The “WannaCry” and “NotPetya” computer viruses that infected computer systems around the world in 2017 sounded a wakeup call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies...more
Businesses are increasingly purchasing dedicated cyber insurance policies to address their cyber and data security exposures. To date, however, many of the judicial decisions addressing insurance for cyber exposures have done...more
We are nine months into a new administration marked by continued uncertainty regarding the legal, regulatory, and budgetary environments for government contractors. Although contractors have benefitted from a precipitous drop...more
This article highlights several strategies for maximizing the value of a cyber insurance purchase. The first part of the article, which appeared in the May 2017 issue of Pratt’s Privacy & Cybersecurity Law Report, highlighted...more
Cyberattacks are attempts by hackers to damage, destroy and/or steal data from a computer network or system. From 2013 to 2015, more than 153.6 million people had information stolen in cyberattacks involving companies such as...more
8/16/2016
/ Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Directors ,
Enforcement Actions ,
Hackers ,
Investment Adviser ,
Investors ,
Mutual Funds ,
OCIE ,
Risk Assessment ,
Securities and Exchange Commission (SEC)
The rising Pokemon Go sensation has dramatically increased the popularity of augmented reality games, but it has also brought with it increased risks and liabilities for both game users and developers alike. For those who...more