Every company should expect that at some point it will experience a data breach. Whether as a result of hackers, disgruntled employees, or careless acts such as losing an unencrypted phone or laptop, data breaches may subject...more
3/26/2019
/ Best Practices ,
Board of Directors ,
Chief Information Officers (CIO) ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Internal Controls ,
Popular ,
Risk Management
Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more
1/23/2019
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Storage ,
Encryption ,
Investors ,
Personal Data ,
Popular ,
Sensitive Business Information ,
Startups ,
Vendors
Most innovative start-up companies appreciate that a sound patent strategy is critical to success in the marketplace, and in making the company attractive to investors and future acquirers. But they overlook the importance of...more