News & Analysis as of

Passwords

Privacy Tip #114 – Your Email May Have Been Hijacked and You Don’t Know It

A new study by Google, the University of California Berkeley and the International Computer Science Institute has concluded that email users are being threatened by massive credential theft and phishing schemes are the...more

SCOTUS Will Not Review CFAA Password Sharing Case

by Jackson Lewis P.C. on

The United State Supreme Court recently denied certiorari in Nosal v. United States, 16-1344, declining to weigh in on the scope of unauthorized access under the Computer Fraud and Abuse Act (“CFAA”). The Ninth Circuit held...more

Do You Have “Security Fatigue”?

Every day it seems a new data security breach has occurred, a new “cyber hack” is in the news…making us run to our phones, computers, bank accounts, you name it, to see if we could be the “one” affected. As a result, more and...more

Moving Beyond Passwords – Does Your Face Raise Privacy Concerns?

by BakerHostetler on

Phishing attacks continue to be the root cause of a considerable number of data breaches. Typically, these incidents occur when employees are enticed into giving up their login credentials in response to a cleverly designed,...more

Use This Checklist to Assess Your Cybersecurity Preparedness

by Steptoe & Johnson PLLC on

When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more

IT Will Scare You – eDiscovery Horrors!

by CloudNine on

Today is Halloween! Hard to believe, but for eight years now, we have identified stories to try to “scare” you with tales of eDiscovery and cybersecurity horrors because we are, after all, an eDiscovery blog. Let’s see how we...more

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

by McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal...more

How Employers Can Become Experts at Data Breaches: Unauthorized authentication of employee accounts

by Bryan Cave on

Service providers that permit your employees to establish a user name and/or password in order to log-into an online portal often monitor employee accounts for indications that an unauthorized person has obtained an...more

Privacy Perils: Phishing in the Ocean of Apps

by Bass, Berry & Sims PLC on

News about phishing attacks implemented through email and websites is very common (see Déjà vu All Over Again; American Express – New Bait for an Old Phishing Lure; Beware of Text Scam, iPhone Users; Beware New Hacker Scheme...more

Are You Doing Enough to Protect Your Company's Secrets?

by Fisher Phillips on

A decade ago, I litigated a trade secret/unfair competition dispute between two large plastics manufacturers. The Plaintiff was based in southwest Florida, the Defendant in southern Alabama. The factual dispute is...more

FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)

by Patrick Law Group, LLC on

Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk. Although the...more

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

by Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

Protecting Your Digital Assets

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

When Technology Becomes Weaponized and the Target is You

by Shipman & Goodwin LLP on

“Technology is a wonderful thing but it’s scary when it’s weaponized against you.” The first sign that my wife’s identity and my own were under attack came innocently enough....more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

Cybersecurity Best Practices

by Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Passwords

by Bryan Cave on

Passwords have become ubiquitous such that many consumers, and many employees, may have dozens of passwords that permit them to access dozens of different systems, services, networks or terminals. From a corporate...more

Illinois takes the lead on employee privacy: What employers need to know

by Thompson Coburn LLP on

When it comes to employee privacy protection, employees in the United States generally do not have a right to privacy in their workplace. By contrast, members of the European Union recognize employee rights to privacy and...more

Here’s a Factor That Can Reduce the Potential for Account Hacks: Cybersecurity Best Practices

by CloudNine on

The data breaches just keep coming.  Equifax is the latest hacking victim to a tune of 143 million US customers – approximately 44 percent of the population.  Perhaps if they, and other organizations recently breached, had...more

Protecting Your Privacy Online Is Possible

Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more

Getting Divorced? Four Cautionary Tips about Accessing Your Spouse’s Electronic Information

by Jaburg Wilk on

Question: I know my spouse’s passwords to their social media accounts, bank accounts and/or email accounts, can I log into their account and get the information we need to help win my case? ...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Privacy Tip #102 – How to Educate Your Employees to Use Long, Easy to Remember Passwords

I feel like I have been writing about Passwords over and over and that’s because I have. Despite hearing about how important passwords are over and over again, compromised passwords continues to be an issue for organizations....more

NIST Publishes Updated Cybersecurity Guidance and Guidance on Passwords

The National Institute of Science and Technology (NIST) has long been a leading authority in Cybersecurity—even before Cybersecurity became a household name. It originally published its Cybersecurity Framework-intended not...more

357 Results
|
View per page
Page: of 15
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.