What's the Tea in L&E? Employee Devices: What is #NSFW?
Hybrid Workforces and Compliance with Sheila Limmroth
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more
While smart toys can certainly be useful educational tools for children, they also present some potential privacy risks and could invade what is traditionally a private space. Think about it—the thought of your child’s toy...more
Mandi Ross, the CEO of both Prism Litigation Technology and Insight Optix, has about 35 years of experience in the eDiscovery space. She started as a paralegal, and has worked as an expert and consultant. She previously...more
It has been reported by Troy Hunt, the security researcher who provides the "Have I Been Pwned" free breach notification service, that 1.4 million passwords and personal information of customers of GateHub, a cryptocurrency...more
Security researchers have warned municipalities repeatedly about how they are being targeted with ransomware, that they are at high risk, and the need to make data security a high priority. Please see full Publication blow...more
If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more
If you’ve flown domestically in the last year, you know the drill. Take off your jacket, belt, and shoes and place them in a bin. Remove your quart-sized bag of 3.4 oz liquids and place them on top. Pull out your laptop,...more
When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more
Pokémon Go has taken the United States and the rest of the world by storm, with an estimated 75 million downloads in the first three weeks since its release. For the uninitiated, Pokémon Go is an augmented reality game where...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more