{ Banner Image }

Showing 34 posts in Cybersecurity.

Cybersecurity Month Serves as Reminder to Take Proactive Steps

Cyber attack preventative measureWhether you are the CEO of a big corporation working in the office six days a week or an analyst working remotely from home entering data, everyone is at risk of a cyber-attack. Despite the fact that all organizations, regardless of size, are at risk, few have preventative measures in place, or have even planned for how they would respond in the event of an attack.  Read More ›

Categories: Criminal, Cybersecurity, Technology

Cybersecurity Impact on Small Businesses in Wake of Colonial Pipeline

In the wake of the Colonial Pipeline ransomware attack, cyber attacks such as ransomware and phishing continue to be a major threat for all businesses, large or small. Even with precautions in place, it is not a matter of "if" but "when" a business will experience an attack. In the case of Colonial Pipeline, the hackers not only demanded and received millions from Colonial Pipeline in May 2021, but the resulting ransomware attack forced the company into a fuel distribution shutdown, making headlines across the country and causing gas shortages on the east coast. The attack also compromised thousands of individuals' personal information.  Read More ›

Categories: Cybersecurity, Did you Know?, News, Technology

Department of Labor Releases Employee Benefits and Cybersecurity Best Practices

IT manOn April 14, 2021, the U.S. Department of Labor’s (“DOL’s”) Employee Benefits Security Administration (“EBSA”) issued its first cybersecurity best practices guidance for retirement plans. The EBSA guidance has been highly anticipated as the frequency and cost of data breaches affecting employee benefit plans continues to rise. The EBSA guidance focuses on actions that plan sponsors, plan fiduciaries, record-keepers, and plan participants can take. Read More ›

Categories: Cybersecurity, Department of Labor, Employee Benefits

HIPAA Compliance Considerations During the Pandemic

HIPAA Compliance COVIDThis article has been updated with new information since it was originally published on November 16, 2020.

As health care providers continue to face new challenges relating to the COVID-19 pandemic, it is important for providers to maintain compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). Although the Department of Health and Human Services Office for Civil Rights (“OCR”) has loosened some requirements to allow health care providers flexibility during the COVID-19 pandemic, a majority of the patient protections under the HIPAA Privacy Rule have remained intact. Read More ›

Categories: Compliance, Cybersecurity, Electronic Health Records, HIPAA

Minimizing Cybersecurity Risks for Remote Workers

With more employees working remotely for the foreseeable future, a resulting increase in spoofing and other hacking attempts is becoming a very common and real threat. It is imperative for a business to have the proper protection policies and procedures in place.

In the following video, moderated by Patricia Scott, attorneys Taylor Gast and Robert Hamor discuss ways to minimize risk and avoid disaster as more employees work remotely. This video touches on the recent rise in computer hacking attempts, along with a discussion on strategies to protect businesses and employees.

Click the thumbnail below to view the full video.

Minimizing Cybersecurity Risks VideoThis video is for general information purposes only and IS NOT LEGAL ADVICE. If you seek legal counsel or need help in determining how this information applies to a specific situation, contact a Foster Swift business & tax law attorney before taking any action.

Categories: Compliance, Cybersecurity, Digital Assets

Health Care Providers Face Growing Ransomware Risks, and Potential Sanctions for Paying Ransom

Ransomware AttackAs if COVID-19 wasn’t enough of a challenge for many struggling hospitals and health care systems, there is another growing threat they must guard against: cyberattacks.

On October 28, 2020, the FBI, Department of Health and Human Services, and Cybersecurity and Infrastructure Security Agency issued a report warning of "an increased and imminent cybercrime threat" to U.S. hospitals and health care providers. Read More ›

Categories: Cybersecurity, Electronic Health Records, Hospice, Hospitals

Legal Impact of a Pandemic - Interview with John Mashni

Attorney John Mashni discusses several topics affecting Michigan businesses amidst the COVID-19 pandemic during an interview with mConnexions' Principal Strategist, Julie Holton. Mashni offers some insight for businesses dealing with issues such as cybersecurity, contract enforcement, and employment. You can view the entire interview below. Please visit our Coronavirus Task Force Page for more resources related to this ongoing situation.


Categories: Compliance, Contracts, Cybersecurity, Employment, Tax

Cyber Insurance: Is it right for you?

Block on KeyboardWe are frequently asked about insurance policies that cover internet-based risks like those involving network security like data breaches and ransomware, as well as data privacy related risks like class action lawsuits for privacy violations and costs related to the increasingly complex landscape of privacy rules. Read More ›

Categories: Cybersecurity, Insurance

Legal Cybersecurity Hotline Launched

Cell Phone in HandsThis blog post has since been updated with new information

Hackers are more sophisticated than ever. It is often not a matter of ‘if’ but ‘when’ a data breach will occur. October is National Cybersecurity Awareness Month and with new threats frequently reported in the media; individuals, businesses, municipalities and other organizations need to do their due diligence in preparing for the inevitable. Read More ›

Categories: Cybersecurity

Using Vendor Management to Protect Your Business's Data

As a business or business owner, one thing to consider when creating a cybersecurity plan, is a vendor management program. Vendor management programs can help businesses address risks that arise when working with vendors and third parties that might be receiving sensitive information or business information. Read More ›

Categories: Cloud Computing, Cybersecurity, Digital Assets, IT Contracts