The stakes have been raised as the EU’s new General Data Protection Regulation, or GDPR, mandates notification within 72 hours. Once that happens, social media and public opinion give you only hours to get it right. It’s often said that one can do something well, or quickly, but not both. …
Articles Posted in Data Breach
What is Blockchain Good For? Here are some guidelines.
Welcome to the third article in our series of blogs about blockchain technology and its impact on business practices, corporate governance and cybersecurity. In Robert Braun’s article, Blockchain: The good, the bad, and how to tell the difference published by FinTech Weekly, he explores two issues about…
The Four Horsemen of Cryptocurrencies: Volatility, criminal activity, security issues, and human error
Welcome to the second article in our series of blogs about blockchain technology and its impact on business practices, corporate governance and cybersecurity. In Robert Braun’s article, Cryptocurrencies – Does the Next Big Thing have Staying Power?, published by FinTech Weekly, he describes four challenges that arise…
Cyberattacks on Hotels — What Should Hotel Owners and Operators Do?
This article was originally published by Hotel Business Review and is reprinted with permission from www.hotelexecutive.com. Almost as soon as there were data breaches, hotels became a prime target of hackers, and the hospitality industry has consistently been one of the most commonly targeted businesses. Since 2010, hotel properties ranging from…
Responding to a Data Breach: CEOs Should Develop a Narrative That Responds to Customers and Regulators
The cybersecurity breaches this month of Equifax and Deloitte—both firms that tout the value of their data and security acumen—show that no company is immune to hacking. But there is one thing that smart companies can do, both before and during a breach, and that is to develop and deploy…
HBO Hack Illustrates That It’s Hard to Tell Exactly What’s Been Compromised
There may be much more missing than the headlines suggest. Some 30 million people watched the Season 7 premiere of “Game of Thrones,” according to its creator, HBO. It’s one of the hottest media properties in years. The popularity of the show, and HBO’s other properties, made HBO the perfect…
Why Data Security Is So Hard (and what to do about it)
It’s ironic: when global threats are in the news every day, their ubiquity makes them easy to ignore. Whether they be political threats, climate threats, or data security threats, we can become numb to ever-present risk. Add in the chorus of advice from the growing number of providers, and even…
Beyond Breach Notification
Ever since California adopted the nation’s first breach notification law in 2002, companies that have suffered a data breach have focused on whether and how to notify their customers, employees and others of the nature and extent of the breach. California’s law has been amended multiple times, and has been…
Middle-Market Companies Require a Customized Approach for Successful Cybersecurity
Middle-market companies have cultures, goals and business needs that are distinct from larger firms, and nowhere is that more true than with cybersecurity. Fortune 500 companies and brands with household names are much more likely to recover their reputations following a data breach. While breaches are costly in financial terms…
Cybersecurity Lawyer — Beyond Tabletop Exercises: Running a Data Breach Drill
You spent valuable time and resources crafting a cybersecurity breach action plan. You’ve assembled a multidisciplinary response team. You’ve identified who is responsible for what, and what decision-tree will go into effect. The plan has been circulated. You’ve even engaged a separate law firm that will be on call in…