News & Analysis as of

Hackers Encryption Data Security

Benesch

Mixed Messages: The Salt Typhoon Encryption Debacle

Benesch on

While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Troutman Pepper Locke

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper Locke on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

Stange Law Firm, PC

Lawyers should be cautious with Zoom

Stange Law Firm, PC on

During the COVID-19 crisis, the use of video conference has been on the rise for lawyers and law firms. Not only are lawyers and law firms using video conference for client and potential client meetings, but it is also...more

Association of Certified E-Discovery...

Coronavirus Home Office Security – Practical Tips for Securing Your “New” Home Office

I’ve been working as an independent consultant for quite some time. Along the journey, I’ve picked up many tips and tricks to maximize productivity while working from home with great results. There have been many articles...more

Faegre Drinker Biddle & Reath LLP

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCAM). NCAM serves as a timely reminder to continue to assess and improve organizational cybersecurity. In honor of NCAM, here are five fundamental steps that every...more

Fisher Phillips

Have You Thought About Encrypting Your Company's Data, And Its Communications? Perhaps You Should

Fisher Phillips on

Alright. So, you’ve battened down the hatches of your company’s premises, to protect your employees and your information. Employees are required to create secret computer passwords they’re not to share with anyone, even...more

Akin Gump Strauss Hauer & Feld LLP

Recent FTC Settlements Highlight Risks of Flawed Information Security Practices and Related Representations

In a set of recent settlements, the Federal Trade Commission (the FTC or Commission) resolved charges against two companies, ClixSense and D-Link, for failing to provide reasonable security and to live up to their data...more

Fisher Phillips

Security Breaches In Schools: 10 Steps To Protect Your Information

Fisher Phillips on

California’s San Diego Unified School District recently disclosed that it had sustained a data breach when multiple phishing emails from malicious hackers were used to gather login information of staff members throughout the...more

Stoel Rives - Global Privacy & Security Blog®

New tool released that may allow bad actors with almost any skill set to bypass many implementations of Two-Factor Authentication...

Until recently, hackers have had limited success stealing Two-Factor Authentication (2FA) PIN and token information. Unfortunately, a tool has been released that will now make it much easier for practically any bad actor to...more

Fisher Phillips

The Government Shutdown Leaves Vulnerability in Cyber Security

Fisher Phillips on

While parts of the Government continue to be shut down over concerns about people crossing the border from Mexico into the United States, the cyber borders are at risk. Many government websites are not being monitored or...more

Bass, Berry & Sims PLC

Privacy Perils: Protecting Data While on the Road

Bass, Berry & Sims PLC on

When the world’s cyber-security experts meet at the largest computer security conference in Las Vegas, many of them leave their regular devices at home and either forgo electronics all together or bring burner phones and...more

Sheppard Mullin Richter & Hampton LLP

States Taking Actions Against Health IT Companies Over Data Breaches

Twelve state attorneys general have brought suit against two medical Information Technology companies. The AGs allege that the companies, Medical Informatics Engineering Inc. and its subsidiary, NoMoreClipboard LLC, had poor...more

Snell & Wilmer

The Arizona Data Breach Law

Snell & Wilmer on

All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law. Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more

Bass, Berry & Sims PLC

Privacy Perils: The Internet of Things

Bass, Berry & Sims PLC on

The Internet of Things (IoT) is a network of connected devices that are able to collect and share data using embedded sensors. Smart homes are an area where IoT is heavily used. For example, using your cell phone while in...more

Bradley Arant Boult Cummings LLP

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

King & Spalding

Weak Baby Monitor Security Subject of FTC Internet of Things Study

King & Spalding on

On January 19, the Federal Trade Commission posted the results of a small study of baby monitor security, finding that four out of five devices tested did not have basic security procedures in place. The FTC warned that such...more

Mintz - Health Care Viewpoints

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

King & Spalding

Investment Adviser Settles SEC Cybersecurity Enforcement Action; SEC Issues Investor Alert

King & Spalding on

On September 22, the U.S. Securities and Exchange Commission (“SEC”) and R.T. Jones Capital Equities Management, Inc. (“R.T. Jones”), a St. Louis-based investment adviser, settled charges that R.T. Jones failed to adopt...more

Foley & Lardner LLP

SEC Brings First Cybersecurity Enforcement Proceeding in Wake of Risk Alert

Foley & Lardner LLP on

Highlights Areas of High Risk and Examination Priorities for Financial Industry Firms - On September 15, the U.S. Securities and Exchange Commission’s (SEC’s) Office of Compliance, Inspections and Examinations (OCIE),...more

Robinson+Cole Data Privacy + Security Insider

Cybersecurity + Law Enforcement: The Cutting Edge Symposium | Friday, October 16, 2015 RWU Law Bristol, RI

Cybersecurity, encryption, and government surveillance are daily challenges for public officials, corporations, and lawyers. On October 16, the Roger Williams University School of Law will present Cybersecurity and Law...more

Broker-Dealer Compliance + Regulation

SEC Charges Investment Adviser With Failure to Adopt Proper Cybersecurity Policies and Procedures

A registered investment adviser agreed to settle SEC charges that it failed to adopt adequate cybersecurity policies and procedures reasonably designed to protect customer records and information as required by Rule 30(a) of...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

King & Spalding

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

King & Spalding on

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

26 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide