All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more
8/3/2018
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
Privacy Laws ,
State Data Breach Notification Statutes
Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more
6/7/2018
/ Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
State Data Breach Notification Statutes ,
Young Lawyers
Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more
11/2/2017
/ Business E-Mail Compromise (BEC) ,
CEOs ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Email ,
FBI ,
Fraudulent Wire Transfers ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Policies and Procedures ,
Spam ,
Spoofing
The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more
Business travelers may be targeted and hacked through hotel Wi-Fi networks, according to a recent report by Kaspersky Lab. Hackers have been stealing company data from top executives at luxury hotels in an attack known as...more