News & Analysis as of

Cybersecurity Best Management Practices

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Bass, Berry & Sims PLC

Privacy Perils: Password Managers

We've harped on the importance of strong passwords several times, and hopefully we are all practicing those tips. Many of us have dozens of online accounts, and while it's tempting to use the same password across the board...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

BakerHostetler

The BakerHostetler Data Security Incident Response Report 2015

BakerHostetler on

The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more

Foley & Lardner LLP

Tips for Protecting Your Data

Foley & Lardner LLP on

With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday – January 12, 2015

Three privacy/security stories that you should know as you start your week: President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals - In a series of speeches this week, President...more

BakerHostetler

Protecting A Family’s Most Valuable Asset – Privacy

BakerHostetler on

Each day, family offices receive, relay, and manage a family’s private information. Depending on the family and the role of the family office, the information managed can be voluminous and include financial information, tax...more

Obermayer Rebmann Maxwell & Hippel LLP

Top Five Resolutions for Covered Entities and Business Associates in 2015

The New Year is here. It is time to make those 2015 resolutions, and not just those for getting fit and healthy. Resolve now to improve your organization’s compliance with the Health Insurance Portability and Accountability...more

Davis Wright Tremaine LLP

California Attorney General Releases Breach Report with Key Findings and Recommendations for Retailers, Financial Institutions and...

California Attorney General Kamala D. Harris has released a “California Data Breach Report,” which presents a series of findings and recommendations based on a review of breaches reported to the Attorney General’s office in...more

Pillsbury Winthrop Shaw Pittman LLP

CIOs Spur Revenue Generation Through Smart Cybersecurity

Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more

Cooley LLP

How Are You Affected By The Recent Massive Data Breach?

Cooley LLP on

As you have probably seen, it was announced on Tuesday, August 5th, that usernames and passwords from 1.2 billion Internet accounts from over 420,000 websites were stolen by a criminal organization in Russia. According to...more

Morrison & Foerster LLP

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

McDermott Will & Emery

OCR to Begin Phase 2 of HIPAA Audit Program

McDermott Will & Emery on

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) will soon begin a second phase of audits (Phase 2 Audits) of compliance with Health Insurance Portability and Accountability Act of 1996 (HIPAA)...more

Gray Reed

Cyber Security: Forewarned is Fair-Warned

Gray Reed on

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

Morgan Lewis

PCAOB Focuses on Cybersecurity at Standing Advisory Group Meeting

Morgan Lewis on

Panelists at the PCAOB’s June 25 Standing Advisory Group Meeting discussed cybersecurity and the potential implications for financial reporting and auditing. Some of the highlights from the panel include the following...more

Dorsey & Whitney LLP

Increasing Risks of Fraud; Compliance Failures; A Willingness to be Unethical

Dorsey & Whitney LLP on

Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more

Perkins Coie

Risk of Data Breaches Keeping You Up? Assess Data Security Before The Holiday Season

Perkins Coie on

Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more

Morgan Lewis

New Cybersecurity Framework Revealed

Morgan Lewis on

The framework provides standards and best practices for identifying, assessing, and managing cybersecurity risk. Now that the Obama administration has unveiled the final version of its anticipated Cybersecurity...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide