Main Menu Back to Page
{ Banner Image }

Showing 28 posts in Cybersecurity.

Using Vendor Management to Protect Your Business's Data

As a business or business owner, one thing to consider when creating a cybersecurity plan, is a vendor management program. Vendor management programs can help businesses address risks that arise when working with vendors and third parties that might be receiving sensitive information or business information. Read More ›

Categories: Cloud Computing, Cybersecurity, Digital Assets, IT Contracts

How are Businesses Preparing for Proposed Federal Data Privacy Legislation? Part Two: Conduct a Data Assessment and Address Risks

This is the second part in a series discussing the actions that companies can take to prepare for potential data privacy legislation. Part One summarizes and discusses recently proposed data privacy legislation. Read More ›

Categories: Compliance, Cybersecurity, Digital Assets, IT Contracts

Michigan Marijuana Retailers: Data Privacy and Cybersecurity Risks

More than 30 states have legalized medical marijuana and more than 10 have legalized marijuana for recreational use, including Michigan in a 2018 ballot proposal. Marijuana retailers have significant issues to address as the industry and the rules governing it mature over time. Among those issues, retailers should not overlook data privacy and cybersecurity issues.   Read More ›

Categories: Cybersecurity, Electronic Health Records, HIPAA

SEC-Regulated Companies Should Address Cybersecurity to Avoid Enforcement Risks

If 2018 was any indication, cybersecurity compliance should be high on the list of SEC-regulated companies’ priorities in 2019. Take, for example, the SEC’s 2018 enforcement action against Voya Financial Advisor, Inc. (“Voya”) for violation of the Red Flags Rule, which resulted in a $1 million settlement. Read More ›

Categories: Compliance, Cybersecurity

Are Boards of Directors Responsible for Cybersecurity?

Whose responsibility within a company is cybersecurity? Should key decisions fall to IT, or should higher management be involved more heavily in day-to-day cybersecurity risk management? Given the large fines and compliance obligations facing companies today, it’s probably obvious to most that data privacy and security is not just a technology issue. Read More ›

Categories: Cybersecurity, Digital Assets

How are Businesses Preparing for Proposed Federal Data Privacy Legislation? Part One: Understanding Current Proposals

Federal data privacy legislation in the United States is looking increasingly likely to pass in the foreseeable future. This renewed outlook is a stark change for those who remember previous legislative proposals, like the 2009 Personal Data Privacy and Security Act that never received a floor vote. Read More ›

Categories: Cybersecurity, Privacy

Cybersecurity and Data Privacy Considerations in Due Diligence

Data privacy and cybersecurity concerns are changing the way potential investors and acquirers evaluate a target company through due diligence. Data and security related risks can be extremely costly – especially those that are not uncovered in due diligence. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets, Privacy

Why Public WiFi is a Health Hazard

In the age of the mobile device, public WiFi is something that most of us will regularly use; whether in a coffee shop getting some extra work done or just waiting in an office area. The risks of this "free" commodity, however, are coming in faster than security specialists can deal with them. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets

Ohio Enacts Unique Safe Harbor to Reduce Data Breach Litigation Risks

On November 2, 2018, Ohio became the most recent state to update its data breach laws by enacting the Ohio Data Protection Act. Read More ›

Categories: Cybersecurity, Digital Assets

Legal Essentials: Shifting Focus to Data Protection, Cybersecurity and Vendor Management

For an introduction to these areas, visit Taylor's previous video, an Introduction to Data Privacy, Cybersecurity and Third Party Vendor Management. 

In recent years, security risks and data breaches have increased and businesses are working to be better equipped to respond to emergency cyber attack and breach situations.  Read More ›

Categories: Cloud Computing, Cybersecurity, IT Contracts, Privacy