Cybersecurity horror stories tend to focus on government agencies, retail outlets, health care institutions, and other companies serving consumers. But business professionals such as lawyers, accountants and business managers are increasingly at risk of attack, and may be less prepared to handle a cyber assault. Late last year, three Chinese…
Articles Posted in Policies and Procedures
Engaging Cybersecurity Counsel Early – It’s the Right Choice
Last year, SEC Chair Mary Jo White named cybersecurity as the biggest risk facing financial markets. But the risk isn’t limited to the financial industry – even a casual review of breach reports in the mainstream press shows that cybersecurity is a risk common to all companies in any industry.…
Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business disruptions. Just ask the owners of the Romantik Seehotel Jaegerwirt hotel, in the Austrian…
The Human Firewall – The First Step to Cybersecurity
One of the challenges – perhaps the biggest challenge – to achieving cybersecurity is complexity. Every day we are faced with new threats as hackers display their creativity and new technologies and approaches to addressing those threats. Governments, both U.S. and foreign, regularly propose laws and regulations better to protect…
They Will Click: Cybersecurity and the Human Factor
Cybercrime cost the world economy about $445 billion in 2014 and the 2015 numbers will be even higher. The cost of data breaches will reach $2.1 trillion globally by 2019. Worldwide spending on information security is estimated to reach $77 billion in 2015. In the midst of these astounding numbers,…
Video & transcript: Why Companies need a cybersecurity training program
Co-chairs of the Jeffer Mangels Cybersecurity and Privacy Group, Robert E. Braun and Michael A. Gold, discuss why companies need a cybersecurity training program. The other videos in this 4-part series include: First steps to take when there’s a data breach at your company; Cybersecurity for middle market companies; and…
Video & transcript: Cybersecurity for middle market companies
Co-chairs of the Jeffer Mangels Cybersecurity and Privacy Group, Robert E. Braun and Michael A. Gold, discuss cybersecurity for middle market companies. The other videos in this 4-part series include: Why companies need a cybersecurity training program; First steps to take when there’s a data breach at your company; and…
Cyber Security: The long arm of the law gets a little longer
Multinational companies often face challenges in enforcing claims against their employees and agents located in foreign jurisdictions. In December 2012, a federal appeals court decision — MacDermid, Inc. v. Deiter, No. 11-5388-cv (2nd Cir. Dec. 26, 2012) — made enforcement a bit easier when a company goes after employees who…
The Seven Deadly Sins of Data Security
There is no shortage of advice on how to secure electronic information. Companies can look to pronouncements by state and federal agencies (for example, the recent statements by the California Attorney General and the Federal Trade Commission on mobile application security), private industry (like the Payment Card Industry’s Data Security…
The Bottom Line: Losing the Expectation of Privacy Bit by Bit, Byte by Byte
Published in The Bottom Line, the State Bar of California’s law Practice Management and Technology Section, as well as Hospitality Net, Hotel Online and ehotelier.com. Download a PDF of the article: Losing the expectation of privacy bit by bit, byte by byte For a generation that has become exceedingly facile…