News & Analysis as of

Business Continuity Plans Cybersecurity Data Protection

Mitratech Holdings, Inc

BCP & IT/DR: Why Your Business Continuity Strategy Needs Both

Balancing Business Continuity and IT Disaster Recovery is crucial for robust organizational resilience. So, how does your organization integrate both strategies for maximum impact?...more

Troutman Pepper Locke

6 Tips for Cos. Facing Service Provider Cyber Incidents

Troutman Pepper Locke on

It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more

Woods Rogers

Cybersecurity Awareness Month: Tips On Practicing Basic Cyber Hygiene

Woods Rogers on

In our first article to kick off Cybersecurity Awareness Month, we will discuss some steps businesses can take to improve their cyber hygiene.  Over the past few years, some of the largest and well-known companies have been...more

Bennett Jones LLP

Crisis and Risk Management Survey 2020 Summary of Findings

Bennett Jones LLP on

To learn more about the current state of crisis and risk management, Bennett Jones commissioned an independent survey by Environics to understand what corporate concerns are most pressing for Canadian general counsel and...more

Robinson+Cole Data Privacy + Security Insider

The Importance of Focusing on Data Recovery and Business Continuity

In the wake of the increase in ransomware attacks, including data exfiltration prior to or during a ransomware attack, I think it is worth the time and resources to focus on data recovery and business continuity....more

Akin Gump Strauss Hauer & Feld LLP

SEC Risk Alert Highlights on COVID-19-Related Compliance Risks and Considerations for Investment Advisers and Broker-Dealers

- The OCIE of the SEC highlights that responses to COVID-19 present important regulatory and compliance issues for SEC registrants, including “heightened risks of misconduct” tied to recent market volatility. - The Risk...more

Mitratech Holdings, Inc

Privacy, Pandemics, and Business Change…OH MY!!!

Economic uncertainty, health and safety, work from home, IT security issues, continuity, and operational resiliency…it is like an intricate pattern of dominos falling over....more

Shumaker, Loop & Kendrick, LLP

Client Alert: Employer Considerations for Remote Workers During and After COVID-19

Many employers found themselves supporting a remote workforce during the COVID-19 pandemic as they adapted quickly to stay-at-home orders and social distancing guidelines. As employers contemplate and implement a...more

Allen Matkins

Mitigating Cybersecurity Risks In Remote Work Environments

Allen Matkins on

Due to the coronavirus pandemic, more employees are working from home than ever before. Companies have been forced to react to maintain productivity, often on reduced timelines and without the careful consideration, rigorous...more

Seyfarth Shaw LLP

Belonging, Connection, and Inclusion Amid COVID-19

Seyfarth Shaw LLP on

In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more

Amundsen Davis LLC

Top 5 Data Privacy Considerations When Managing A Workforce Working At Home

Amundsen Davis LLC on

For most businesses the mass transition to working from home during COVID-19 shelter in place orders is a new venture. However, with this (temporary) transition from operating out of the same building, what should remain is...more

Cadwalader, Wickersham & Taft LLP

COVID-19 Update: Cybersecurity and Data Privacy Best Practices Remain Critical During the Coronavirus Pandemic

With much of the nation’s workforce transitioning to telework for the foreseeable future, hackers and scammers are lurking to take advantage of technical vulnerabilities and anxious targets. ...more

Foley Hoag LLP - Security, Privacy and the...

Beware of COVID-19-Based Cyber Attacks, Say US and UK Agencies

Malicious cyber actors have been exploiting the COVID-19 crisis, warn the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC) in a joint...more

K2 Integrity

COVID-19: Managing the Security Risks of a Remote Workforce

K2 Integrity on

As COVID-19 remains prevalent, working remotely has become the new normal. This means that many organizations will have people working from home for extended periods, many of whom may not be familiar with the organization’s...more

Proskauer on Privacy

FTC Ramps up COVID-19 Activity After Improving its Data Security Enforcement Orders

Proskauer on Privacy on

With the spread of the novel coronavirus (COVID-19), cybersecurity criminals and scammers are ramping up their efforts to target vulnerable employers and workforces. The FTC announced today that since January they have...more

Lathrop GPM

Cybersecurity for a Remote Workforce

Lathrop GPM on

Coronavirus (COVID-19) has prompted a rush by many organizations to a remote working environment. This alert outlines key security considerations for remote work, plus some resources....more

Mintz - Privacy & Cybersecurity Viewpoints

Coronavirus (COVID-19): Managing Cyber Security Risks of Remote Work

With cases of the Novel Coronavirus (COVID-19) emerging in nearly every state, many businesses are taking swift action in an effort to curb its spread. Teleworking, “remote working,” or simply “working from home,” is a...more

Lowndes

Five Cybersecurity Practices to Minimize Risk During Coronavirus

Lowndes on

As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more

Hogan Lovells

Employers Take Notice: Increased Cybersecurity Threats Amid Coronavirus Precautions

Hogan Lovells on

On March 11, the Word Health Organization officially characterized the coronavirus (COVID-19) outbreak as a pandemic. During the outbreak, many employers around the world are seeking to prioritize the well-being and safety of...more

Proskauer - New Media & Technology

Protecting against Cybersecurity Threats when Working from Home

With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread...more

Burr & Forman

FINRA & COVID-19: Review Your BCP; OK’s Remote Work

Burr & Forman on

This week FINRA issued Reg. Notice 20-08 on “Pandemic-Related Business Continuity Planning, Guidance and Regulatory Relief.”...more

Ballard Spahr LLP

How to Be Ready for Coronavirus-Related Cybersecurity Challenges

Ballard Spahr LLP on

The novel coronavirus outbreak is creating electronic communication and data privacy concerns on a number of fronts. One immediate effect is a significant increase in phishing scams, used by threat actors to launch malware...more

Proskauer - New Media & Technology

Coronavirus and the “100% Work-From-Home” Scenario: Review Agreements with Vendors of Remote Access Technology

As part of the response to the outbreak of COVID-19, many organizations are working on contingency and business continuity plans that include an all-employee “work-from-home” scenario. If it becomes necessary to implement...more

Pillsbury Winthrop Shaw Pittman LLP

COVID-19 Threats Raise Pressure on IT Systems and Cybersecurity Readiness

Practical steps to address cybersecurity threats—precautions to prepare for the possible system impacts from COVID-19. Organizations preparing for COVID-19 are testing and implementing business continuity plans to address...more

Mintz - Privacy & Cybersecurity Viewpoints

Beware the Coronavirus Email Scams

COVID-19 is not the only virus associated with the global outbreak. As predictably as night follows day, cybercriminals have been using the epidemic as a means to spread their malicious payloads. Companies should include...more

29 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide