As the global pandemic begins to show signs of waning, cyber risk is showing no such easing. In fact, in a recent survey, over 68% of business leaders reported believing that their cybersecurity risks are increasing, despite...more
As the nation emerges from the pandemic, clients face the double-whammy of delayed resolution of existing disputes (thanks to court shutdowns) and increased litigation activity across the board. The third quarter of 2020 saw...more
4/2/2021
/ Biometric Information ,
Biometric Information Privacy Act ,
Business Interruption ,
Commercial Bankruptcy ,
Commercial Litigation ,
Commercial Tenants ,
Coronavirus/COVID-19 ,
Data Privacy ,
Insurance Litigation ,
Landlords ,
Paycheck Protection Program (PPP) ,
Uniform Commercial Code (UCC)
This month, the cybersecurity research firm Volexity found a series of four critical security vulnerabilities in Microsoft’s Exchange Server software. Since then, vulnerability has been independently verified and confirmed...more
Seyfarth Synopsis: The attorney-client privilege is a bedrock legal principle that protects a client from providing a court or adversary with confidential communications exchanged in the course of providing or receiving...more
In response to the COVID-19 crisis, nearly all companies and organizations were abruptly forced to transition portions of, and in many cases, their entire workforce to remote work. ...more
Seyfarth Synopsis: In the past week, the cybersecurity community has seen a dramatic increase in the number of attacks being made on healthcare organizations around the globe....more
4/5/2020
/ Coronavirus/COVID-19 ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Hackers ,
Health Care Providers ,
Information Governance ,
Malware ,
Risk Management ,
Vulnerability Assessments
Seyfarth Synopsis: As individuals and businesses continue to focus on the rising number of confirmed Coronavirus cases throughout the world and what steps they can take to guard against infection, malicious actors are...more
3/31/2020
/ Coronavirus/COVID-19 ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Protection ,
Employer Liability Issues ,
Hackers ,
Information Governance ,
Information Technology ,
Malware ,
Phishing Scams ,
Risk Management ,
Telecommuting
In this unprecedented time, businesses are, more than ever, implementing and rapidly rolling out programs for remote or at-home work by employees. The quick changes in local and state governmental “shelter in place”...more
3/23/2020
The specter of a data breach is an unfortunate reality for anyone that uses a computer. Corporations are obviously large targets, with potentially thousands of employees doing things on computers. Some of those things are...more
12/13/2019
/ Artificial Intelligence ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Management ,
Data Privacy ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Risk Management ,
SHIELD Act
Seyfarth Synopsis: When choosing a GPS location tracking app, California employers must consider several factors to see if the app unduly infringes on employee privacy. Let some references to popular music be your guide....more
1/25/2019
/ Data Collection ,
Employee Microchipping ,
Employee Monitoring ,
Employer Liability Issues ,
Employment Policies ,
GPS ,
Mobile Apps ,
Privacy Concerns ,
Privacy Policy ,
Right to Privacy ,
Technology
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
9/28/2017
/ Best Practices ,
Cell Phones ,
Cybersecurity ,
Data Protection ,
Data Security ,
Email ,
Enhanced Cybersecurity Services ,
Hackers ,
Internet ,
Malware ,
Mobile Devices ,
Passwords ,
Personally Identifiable Information ,
Phishing Scams ,
Popular ,
Scams ,
Spam ,
Wifi
Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. ...more
5/16/2017
/ Bitcoin ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FBI ,
Hackers ,
Health Care Providers ,
Malware ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
US-CERT
In his “Data Is a Toxic Asset” blog post, Bruce Schneier argues that data is a toxic asset and that the lesson all the recent data breaches are teaching us is that storing this asset is “dangerous,” because it makes companies...more
In recent years, the prevalence of data and information security breaches at major corporations have become increasingly more commonplace. While general awareness may be increasing, many companies are still neglecting to...more
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more