News & Analysis as of

Passwords Best Practices

Proskauer - Employee Benefits & Executive...

DOL Updates Guidance on Pension and Health & Welfare Plan Cybersecurity Best Practices

In 2021, the U.S. Department of Labor (DOL) issued 3 documents outlining guidance on cybersecurity practices for benefits plans, which we discussed in a blog post at the time. The DOL recently issued revised versions of the...more

Ward and Smith, P.A.

Senior Savvy: Wise Owls Navigating Cyber Scams

Ward and Smith, P.A. on

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

Mitratech Holdings, Inc

Secure Our World: 4 Work-Related Security Best Practices for Cybersecurity Awareness Month

Mitratech Holdings, Inc on

It’s Cybersecurity Awareness Month, and this year marks the 20th anniversary of the campaign. Introducing “Secure Our World” as the central theme, the Cybersecurity Infrastructure and Security Agency (CISA) is on a...more

Jackson Lewis P.C.

Federal Agencies Issue Joint Alert On Imminent Cybercrime Threat To Healthcare Providers

Jackson Lewis P.C. on

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have issued a joint cybersecurity advisory stating they have...more

Troutman Pepper

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

Clark Hill PLC

Zoom Security Best Practices

Clark Hill PLC on

Many organizations working remotely have been using Zoom, a popular video conferencing platform, which was recently in the news for major security flaws. If your organization is currently using or is considering using Zoom,...more

Bass, Berry & Sims PLC

Privacy Perils: Refresher Course in Good Password Hygiene, Part 5 – Parting Password Protection Pearls

Bass, Berry & Sims PLC on

Earlier in this series we discussed securing your online account information by using a built-in browser or a third-party password manager in conjunction with prudent password creation. Regardless of the methods chosen,...more

Sunstein LLP

Exploitation of Publicly Available Website Data May be Unstoppable

Sunstein LLP on

Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more

Farella Braun + Martel LLP

What California’s New Security Law Means to Your Business

Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more

McManis Faulkner

Hackers are Vampires - Keep Them from Feeding on Your Private Information

McManis Faulkner on

According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more

Payne & Fears

A Primer on Converting to Paperless HR

Payne & Fears on

Congratulations, your organization has decided to transition to a paperless human resources environment. While the benefits are numerous, such as increased efficiency and cost savings, the actual process of converting paper...more

Whitman Legal Solutions, LLC

Fraud and Forgery: From Vintage Violins to Today’s Real Estate Transaction

Fraud has a long history. In a recent blog in the Orchestrating Real Estate Series, New Things to Consider in Section 1031 after the Tax Cut and Jobs Act of 2017, I discussed how famous violin maker Jean-Phillipe...more

McManis Faulkner

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

Carlton Fields

Cyber Update: Five Tips from the Front Lines of Practice to Limit Your Company’s Losses from a Breach

Carlton Fields on

We help companies prepare for, respond to, and clean up data breaches and related events. We are lawyers, but in this role, we often look over the shoulders of cybersecurity technical experts, who are advising companies on...more

Gray Reed

Hack Attack?

Gray Reed on

Breathing a sigh of relief that he neither works for U.S. agencies requiring security clearances nor do his hiring policies require the details of mental illnesses, drug and alcohol use, past arrests, bankruptcies, Joe Hyre...more

Snell & Wilmer

World Password Day 2015!

Snell & Wilmer on

Yes, today is “World Password Day 2015? (#PasswordDay).  While it may not have the same panache as Cinco de Mayo, a day devoted to passwords still can be useful, especially for those who use terms like “bieber”, “123456”,...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide