News & Analysis as of

Passwords Personal Information

Robinson+Cole Data Privacy + Security Insider

Phishing Attacks – Anyone Can Get Pwned

HaveIBeenPwned is a website that allows users to check whether their data has been involved in data breaches. The website’s creator, Troy Hunt, was the subject of a phishing attack earlier this week....more

Proskauer - Law and the Workplace

New York Employers Be Aware – Social Media Access Law Takes Effect

New York employers should take note of a new law that recently took effect that impacts their ability to access applicant and employee social media accounts. The law applies to all employers covered by the New York Labor Law...more

K2 Integrity

Scanning, Chatting, And Shopping: Holiday Risks To Organizations

K2 Integrity on

Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more

StoneTurn

Tips to Avoid the Common Fraudster: Lessons from Corporate Investigations

StoneTurn on

With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Guidepost Solutions LLC

Forget Spy Balloons - The Bigger Threat is TikTok

After the downing of the Chinese spy balloon by U.S. Forces in early February 2023, several additional objects have been identified over U.S. and Canadian airspace. While officials have denied that these were additional spy...more

Kohrman Jackson & Krantz LLP

Ten Ways You Can Protect Your Privacy on Social Media

Social Media connects people across the world by providing users with a means to share content. It has undoubtedly become a huge part of our daily routines. In 2021, Americans spent an average of two hours and thirty minutes...more

Wiley Rein LLP

FTC Uses Enforcement Proceeding to Send Message on Account Security Practices

Wiley Rein LLP on

Account security and digital identity have been hot topics for regulators and at the National Institute of Standards and Technology (NIST). The government has been promoting multifactor authentication (MFA) and innovation in...more

Jackson Lewis P.C.

Preventing “Credential Stuffing” Attacks, Guidance from NY State Attorney General Letitia James

Jackson Lewis P.C. on

After reading New York Attorney General Letitia James’ Business Guide for Credential Stuffing Attacks (“Guide”), I promptly reminded my family (and myself!) to change passwords. The practice of using the same password for...more

Association of Certified E-Discovery...

Defining Doxing And Learning How to Avoid It

From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more

Holland & Hart - The Benefits Dial

Staring at the Stars Above, Wonder What [Fiduciary Duties] Are We Made Of – Cybersecurity for Retirement Plans

Noting that there has been an increase in computer crime in connection with the economic disruption caused by COVID-19, companies should remember that retirement plan accounts are attractive targets for cyber thieves because...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide