News & Analysis as of

Passwords

Fraud and Forgery: From Vintage Violins to Today’s Real Estate Transaction

Fraud has a long history. In a recent blog in the Orchestrating Real Estate Series, New Things to Consider in Section 1031 after the Tax Cut and Jobs Act of 2017, I discussed how famous violin maker Jean-Phillipe...more

United Kingdom Establishes IoT Security Principles

by Morgan Lewis on

The UK government recently released a policy paper outlining proposed requirements for makers of Internet of Things (IoT) devices to take certain actions to better protect IoT devices from growing cybersecurity threats....more

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

by McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Cybersecurity 101 for Startups

Every business, including startups, has data to protect. So, it’s not really a matter of if, but when an organization will experience cyber and data privacy threats. This post will provide tips on how to proactively protect...more

Privacy Perils: Avoiding the Spectre of a Meltdown

by Bass, Berry & Sims PLC on

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more

Privacy Perils: For What It's Worth

by Bass, Berry & Sims PLC on

Depending on the calculation method, what you are may be worth as little as $5. Who you are, however, can be worth much more. Experian recently sent an email linking out to an interesting article on the amount your...more

Ancestry.com Server Exposes 300,000 Email Addresses and Passwords

Ancestry.com has confirmed that RootsWeb, its free website for individuals to search genealogy, recently had a security vulnerability on its server that exposed a file containing the usernames, email addresses and passwords...more

Privacy Perils: Password Managers

by Bass, Berry & Sims PLC on

We've harped on the importance of strong passwords several times, and hopefully we are all practicing those tips. Many of us have dozens of online accounts, and while it's tempting to use the same password across the board...more

When It Comes to Cybersecurity, Passwords are Passé

by Nexsen Pruet, PLLC on

In the ever-changing landscape of data security, it is increasingly clear that law firms of all sizes, from the one-lawyer shop to the 1,000-lawyer megafirm, are being targeted by hackers. As the methods used to gain access...more

Privacy Tip #114 – Your Email May Have Been Hijacked and You Don’t Know It

A new study by Google, the University of California Berkeley and the International Computer Science Institute has concluded that email users are being threatened by massive credential theft and phishing schemes are the...more

SCOTUS Will Not Review CFAA Password Sharing Case

by Jackson Lewis P.C. on

The United State Supreme Court recently denied certiorari in Nosal v. United States, 16-1344, declining to weigh in on the scope of unauthorized access under the Computer Fraud and Abuse Act (“CFAA”). The Ninth Circuit held...more

Do You Have “Security Fatigue”?

Every day it seems a new data security breach has occurred, a new “cyber hack” is in the news…making us run to our phones, computers, bank accounts, you name it, to see if we could be the “one” affected. As a result, more and...more

Moving Beyond Passwords – Does Your Face Raise Privacy Concerns?

by BakerHostetler on

Phishing attacks continue to be the root cause of a considerable number of data breaches. Typically, these incidents occur when employees are enticed into giving up their login credentials in response to a cleverly designed,...more

Top 10 Tips for Cybersecurity Employee Training

by Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Use This Checklist to Assess Your Cybersecurity Preparedness

by Steptoe & Johnson PLLC on

When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more

IT Will Scare You – eDiscovery Horrors!

by CloudNine on

Today is Halloween! Hard to believe, but for eight years now, we have identified stories to try to “scare” you with tales of eDiscovery and cybersecurity horrors because we are, after all, an eDiscovery blog. Let’s see how we...more

Cybersecurity Awareness Month: How to Protect Your Firm Against Cyber Threats

by McManis Faulkner on

October is Cybersecurity awareness month. Now is a better time than ever to look at your current practices at the office and even at home. It is important to know that we all play a role in keeping our work and personal data...more

How Employers Can Become Experts at Data Breaches: Unauthorized authentication of employee accounts

by Bryan Cave on

Service providers that permit your employees to establish a user name and/or password in order to log-into an online portal often monitor employee accounts for indications that an unauthorized person has obtained an...more

Privacy Perils: Phishing in the Ocean of Apps

by Bass, Berry & Sims PLC on

News about phishing attacks implemented through email and websites is very common (see Déjà vu All Over Again; American Express – New Bait for an Old Phishing Lure; Beware of Text Scam, iPhone Users; Beware New Hacker Scheme...more

Are You Doing Enough to Protect Your Company's Secrets?

by Fisher Phillips on

A decade ago, I litigated a trade secret/unfair competition dispute between two large plastics manufacturers. The Plaintiff was based in southwest Florida, the Defendant in southern Alabama. The factual dispute is...more

FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)

by Patrick Law Group, LLC on

Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk. Although the...more

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

by Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

Protecting Your Digital Assets

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

When Technology Becomes Weaponized and the Target is You

by Shipman & Goodwin LLP on

“Technology is a wonderful thing but it’s scary when it’s weaponized against you.” The first sign that my wife’s identity and my own were under attack came innocently enough....more

364 Results
|
View per page
Page: of 15
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.