It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken...more
4/19/2019
/ Best Practices ,
Cloud Computing ,
Cloud Service Providers (CSPs) ,
Contract Drafting ,
Contract Negotiations ,
Contract Terms ,
Data Breach ,
Self-Help Remedies ,
Service Contracts ,
Technology Sector ,
Third-Party Service Provider
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more
7/31/2015
/ Best Practices ,
Breach Notification Rule ,
Business Interruption ,
China ,
Class Action ,
Cloud Computing ,
Crisis Management ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Employment Policies ,
Encryption ,
FCC ,
Home Depot ,
Information Management ,
Pending Legislation ,
Proposed Legislation ,
Reputation Management ,
Risk Assessment ,
Risk Management ,
Risk Mitigation ,
Security and Privacy Controls ,
Sony ,
UCLA
Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses...more