Latest Posts › Hackers

Share:

Don’t Gamble With Your Cybersecurity and Incident Response Plan: Lessons Learned from the Las Vegas Ransomware Attacks

Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more

Employers’ Rights Under the Computer Fraud and Abuse Act (CFAA) Narrowed after Supreme Court Decision in Van Buren

In today’s digital age, employers store immense amounts of information, including confidential and proprietary information, on their on-premises systems, cloud-servers and other data storage solutions. With this collection of...more

Cybersecurity In The Home Office: How To Stay Vigilant During COVID-19

The #1 weakness of a business for cyber security can be users of that technology. From employees to management and those in the C-suite, anyone can fall victim to business email compromise (BEC). That was true when companies...more

Ransomware Attack Of Fleet Vehicles? Yes, It Could Happen To You

The following scenario may sound familiar. It’s a busy afternoon, and your operations manager gets a call from a driver. She’s stuck in the middle of a highway, and her truck died without warning. Naturally, there’s an...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide