Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more
9/29/2023
/ ATMs ,
Casinos ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Employee Training ,
Hackers ,
Incident Response Plans ,
LinkedIn ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Assessment ,
Risk Management
In today’s digital age, employers store immense amounts of information, including confidential and proprietary information, on their on-premises systems, cloud-servers and other data storage solutions. With this collection of...more
11/9/2021
/ Computer Fraud and Abuse Act (CFAA) ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Security ,
Defend Trade Secrets Act (DTSA) ,
Hackers ,
Passwords ,
Popular ,
Termination ,
Van Buren v United States
The #1 weakness of a business for cyber security can be users of that technology. From employees to management and those in the C-suite, anyone can fall victim to business email compromise (BEC). That was true when companies...more
The following scenario may sound familiar. It’s a busy afternoon, and your operations manager gets a call from a driver. She’s stuck in the middle of a highway, and her truck died without warning. Naturally, there’s an...more