2019 is a nonstop carnival of consultants and lawyers sending you hither and thither as each new state effort to solve the purported ills of the digital world flashes its shiny omnibus bill for a moment before being dragged...more
New study finds dramatic increases in threats and awareness of threats to knowledge assets — the confidential information that is most strategic to a company’s business — and remarkable strides by high-performing...more
The State of New York’s response to two large cybersecurity breaches may fuel the transformation of the state regulation of corporate cybersecurity in the U.S. Unlike typical state data breach statutes which focus on...more
The State of New York’s response to two large cybersecurity breaches may fuel the transformation of the state regulation of corporate cybersecurity in the U.S. Unlike typical state data breach statutes which focus on...more
In a remarkable opinion with potentially wide-ranging implications, the United States District Court for the District of Columbia recently allowed a member of the public to sue a federal government contractor directly for...more
Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more
1. Beyond Breaches -
With ransomware, cybersecurity in healthcare has gone far beyond HIPAA compliance, breaches of PHI or identity theft. For the unprepared healthcare provider not able to prevent ransomware or...more
You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more
3/10/2016
/ Confidential Information ,
Customer Lists ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Encryption ,
Passwords ,
Payroll Records ,
Personal Data ,
Privacy Policy ,
Trade Secrets ,
Vendors
Global organizations need a resilient strategy and actionable plans for dealing with the two worlds of privacy, cybersecurity, and data protection and governance: the world of rights and the world of harm. Emanating from...more