{ Banner Image }

Showing 36 posts in Cybersecurity.

Legal Essentials: An Introduction to Data Privacy, Cybersecurity and Third Party Vendor Management

With the rise of data breaches and regulatory enforcement, businesses must acknowledge cybersecurity and data privacy issues as significant business risks. Read More ›

Categories: Cloud Computing, Cybersecurity, Digital Assets, IT Contracts

Cybersecurity Concerns in Health Care

Health care systems are eager to adapt to newer technology and widespread network options, all in the name of giving patients the best possible care. However, this comes with a price: more outlets for hackers to breach valuable data.  Read More ›

Categories: Cybersecurity, Electronic Health Records

GDPR Has Arrived and My Company Isn't Ready. Now What?

It's not hyperbole to say that the General Data Protection Regulation's May 25th enforcement date marks one of the largest shifts in the history of privacy laws. Read More ›

Categories: Cloud Computing, Compliance, Cybersecurity, Digital Assets, Liability, News, Privacy

Provisions for Vendor Contracts

This is the second article in a series on Third Party and Vendor Management. The first article discussed pertinent considerations for vendor contracts in the context of cybersecurity. Read More ›

Categories: Contracts, Cybersecurity, Did you Know?, Digital Assets

Potential $13.5 Million Uber Fine Highlights the Importance of Risk-Based Breach Response

The legal fallout from ridesharing service Uber's 2016 data breach, which affected approximately 57 million riders and drivers, has been significant. Read More ›

Categories: Cybersecurity, Did you Know?, Lawsuit

Considerations for Vendor Contracts

This is the first article in a series on Third Party and Vendor Management. The next article in this series discusses provisions for vendor contracts. Read More ›

Categories: Cloud Computing, Cybersecurity, Liability, Privacy

The Dangers of the DarkNet

When people think of the term "cybercrime", things like fraud and phishing scams commonly come to mind. Less known and discussed is the “DarkNet,” a digital underworld that is inaccessible to most and where illicit marketplaces exist for things like stolen identity information. Read More ›

Categories: Criminal, Cybersecurity

Pros and Cons of Software as a Service ("SaaS")

Today, the use of software as a service ("SaaS") is widespread and the cybersecurity considerations are an afterthought. Read More ›

Categories: Cloud Computing, Cybersecurity, Did you Know?, IT Contracts, Technology

Are Ransomware Payments Tax Deductible?

Earlier this year it was revealed that hackers had seized 1.5 terabytes of data from HBO, and over the course of the summer the hackers released the stolen property, including script summaries for "Game of Thrones," as well as scripts and entire seasons of other HBO shows. Read More ›

Categories: Cybersecurity

Equifax or EquiFaux Pas: Updates on the Equifax Breach

In September 2017, credit reporting agency Equifax announced that personal information for over 140 million U.S. consumers was potentially compromised. Equifax’s forensic investigations have put the number closer to 145.5 million. The compromised data includes names, social security numbers, birth dates, addresses, driver’s license numbers and even credit card numbers. Within a matter of weeks after the breach, Equifax’s CEO, Richard Smith, announced he was stepping down. It soon became clear that Equifax’s troubles were just beginning. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets