Latest Publications

Share:

Avoid Becoming Another Hacking Statistic: A Primer on Foreign Domain Extensions

Risk Management Question: Most of my clients and contacts are located in the United States; is there an easy way to recognize emails that originate outside the U.S.? What should I do if I receive an email from a name that I...more

Avoiding Social Engineering Scams

Risk Management Question: October is cyber security awareness month. What steps are you taking to avoid common Internet scams? The Issue: Hackers and their exploits are growing more sophisticated by the day. Avoiding their...more

Your Mobile is Not Just a Phone — It's a Handheld Mini-Computer Subject to Attack

Risk Management Question: We need to stop treating our mobile phones like they're just phones. They are mini-computers more powerful than the computers that guided the Apollo 11 spacecraft to the moon and back. What common...more

Beware of Potential "Vishing" Scams

Risk Management Question: What should I do if I receive a call from my bank or a retailer about possible fraud or suspicious charges made with my credit card?...more

Personal Information is being used in a New Cyber Extortion Scam

Risk Management Question: Personal information about you is knowingly or unwittingly circulated in cyberspace every day. A new cyber extortion scam involves emails claiming to have embarrassing or incriminating information...more

Thought you escaped the GDPR? California Enacts Comprehensive Privacy Law

California has enacted a comprehensive privacy law, the California Consumer Privacy Act of 2018 (CCPA). The CCPA, which goes into effect on January 1, 2020, addresses the processing of personal information of California...more

Consider Resetting (or, at a minimum, Rebooting) Your Routers to Disable Latest Malware

Risk Management Question: How can law firms and businesses protect against the latest Russian-developed malware threat affecting more than 500,000 routers?...more

Cyber Alert - Dual Factor Authentication Can Be Hacked By Phishing

Risk Management Question: Dual factor authentication greatly increases your online security, but it is no panacea. Dual factor authentication can be compromised through social engineering and phishing exploits. What can law...more

Cyber Alert – GDPR Implications for U.S. Law Firms

Risk Management Question: Do U.S. law firms need to comply with the General Data Privacy Regulation ("GDPR"), a new European mandate that extends well past the borders of the European Union? If so, what steps need to be taken...more

Cyber Alert - Social Engineering Fraud

Risk Management Question: How can lawyers identify and avoid increasingly common social engineering scams?...more

The Lawyers' Lawyer Newsletter - Halloween Issue October 2017

Client Intake — Due Diligence — Liability to Parties Other than Client — Holding Funds in Trust - P&P Property Ltd. V. Owen White & Catlin LLP, et al. 2016 WL 05484797 (English High Ct. of Justice, Chancery Div. 2016)...more

The Lawyers' Lawyer Newsletter - Recent Developments in Risk Management - February 2017

Joint Representation — Conflicts of Interest — Waiver - Foltz v. Columbia Casualty Company, 2016 WL 4734687 (W.D. Ok. 2016) - Risk Management Issue: Can client A's waiver, given with informed consent, permitting...more

Sanctions Under FED. R. CIV. P. 37(E)

In December 2015, amendments to the Federal Rules of Civil Procedure went into effect. One of the amended rules, Rule 37(e), was completely rewritten in an attempt to develop a uniform, national standard for the imposition...more

38 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide