News & Analysis as of

Data Security Passwords Risk Mitigation

K2 Integrity

World Password Day: Security Through Long, Unique Passwords

K2 Integrity on

Today is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. Given the large number of...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Society of Corporate Compliance and Ethics...

Compliance Perspectives: Cybervigilance and Cyber-resiliency

Mark Lanterman, Chief Technology Officer of Computer Forensic Services lives technology at its most terrifying, helping organizations manage the risks of the IT we all use constantly. Recently he authored an article...more

Furia Rubel Communications, Inc.

Cybersecurity: How to Protect Yourself and Your Company

Just recently, Equifax had the largest-ever settlement for a data breach. They are to pay at least $575 million, and potentially as much as $700 million, to settle allegations over its massive 2017 data breach. What we tell...more

Bass, Berry & Sims PLC

Privacy Perils: Summer Travel Privacy Tips

Bass, Berry & Sims PLC on

Summer travel is upon us! Gone are the days of just packing a suitcase full of clothes and a good book. Today, most of us cannot board a plane without a laptop, tablet, smartphone or two. “Travelers are particularly...more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

White & Case LLP

Cybersecurity and the UK legal landscape

White & Case LLP on

As businesses continue to digitise their assets and operations, the need to continually assess IT infrastructure and the technical measures in place to safeguard key information assets and data becomes ever more important....more

Bass, Berry & Sims PLC

Privacy Perils: Protecting Data While on the Road

Bass, Berry & Sims PLC on

When the world’s cyber-security experts meet at the largest computer security conference in Las Vegas, many of them leave their regular devices at home and either forgo electronics all together or bring burner phones and...more

Bass, Berry & Sims PLC

Privacy Perils: Five Reminders for a Safer Cyber Household

Bass, Berry & Sims PLC on

In conjunction with the conclusion of National Cybersecurity Awareness Month in October, it’s a good time to remember these cybersecurity reminders from the National Cyber Security Alliance and the U.S. Department of Homeland...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

McAfee & Taft

Gavel to Gavel: Preventing data breaches

McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide