In this fast-growing digital world, many people depend on and use virtual private networks (VPNs) to protect online privacy and safety. However, residents and citizens need to know the legality of using VPNs under UAE law....more
The New York State Department of Financial Services (“NYDFS”) has urged organizations to exercise caution when hiring remote employees due to an increase in individuals located in the Democratic People’s Republic of Korea...more
Because technology develops so rapidly, and “trends” are fast and furious, it is always hard to predict what the big issues will be for the next year. A year is a long time in the tech field. Just look at how fast ChatGPT...more
Chinese authorities have arrested alleged hackers in what appears to be the first-ever reported case of hackers using AI to develop ransomware. These alleged hackers reportedly used ChatGPT to refine the code for their...more
The IRS concluded its special summer series with important reminders to tax professionals and taxpayers to protect themselves against Identity theft. The reminders for tax professionals and taxpayers to reduce identity...more
Key Points: Illumina DNA sequencing machines are vulnerable to exploitation. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have published advisories urging all...more
Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more
Current Situation in Iran - A historic and powerful popular movement—led by women in response to the murder of Mahsa Amini while in the custody of the Iranian Morality Police in mid-September—is currently unfolding in...more
On 8/16/22As part of the IRS Security Summit, the IRS presented steps that tax professionals can recommend to help their clients battle identity theft risk. The IRS Security summit is comprised of tax professionals including...more
VIRTUAL PRIVATE NETWORKS - Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead...more
On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In), a functional organization under the Ministry of Electronics and Information Technology (MeitY), Government of India issued directions under sub-section...more
An Employee Handbook Should Fit the Current Workplace Model - Following Covid-19 shutdowns, many employers have moved to a hybrid workplace, where a section of the employees works remotely for all or part of their...more
Q: Do work-from-home arrangements create a heightened risk that company trade secrets may be exposed? ...more
Second Circuit Denies Settlement of Data Breach Case Due to Lack of Standing - As we previously reported, in April 2021, the Second Circuit became the latest federal circuit to hold that an individual may establish Article...more
Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more
It has been barely a month since we reported on the recent ransomware attack on the Colonial Pipeline Company, yet news continues to break with additional revelations about the recent attack. What we have learned during the...more
Notwithstanding federal, state, and local privacy and cybersecurity laws that may apply, employers may generally use artificial intelligence, data analytics, and other software and technologies to track remote workers. The...more
A new decision from the First Circuit upholding the federal government’s authority to search the electronic devices of anyone entering the United States — in some instances without a warrant, probable cause, or even...more
Bloomberg Law recently reported that Goodwin Procter was the latest law firm to fall victim to a data breach after one of its vendors was hacked. Cyberattacks on law firms and businesses have become increasingly common over...more
ERCOT has experienced more attention to and development of Private Use Networks (“PUN”) in the last months and years. This post summarizes what these “islands in the grid” are, their positive attributes, and how to create...more
As the COVID era drags on, it is clear that work life “post-COVID” may be very different from life “pre-COVID.” This is especially true as it relates to IT security. More and more employees have shifted to a telecommuting...more
You probably heard about the recent hack of Twitter accounts that took place on July 15, 2020. The hackers took over several prominent Twitter accounts, which resulted in a scam that netted over $118,000 in bitcoin for the...more
It is no secret that companies are experiencing an increase in security incidents following the transition from work in the office to work from home during the pandemic. There are a number of causes, including the difficulty...more
On October 6, 2020, the Federal Bureau of Investigations (FBI) issued a warning to consumers about using WiFi when teleworking from a hotel. The FBI acknowledges that many workers are having difficulty working from home...more
When the Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) get together to issue an alert to warn us about a security threat, you can bet that the threat is real, and that...more