Close Contact Us
Tap Here To Call Us

Articles Posted in Policies and Procedures

Updated:

Professional Service Firms Ignore Cybersecurity at Their Peril

Cybersecurity horror stories tend to focus on government agencies, retail outlets, health care institutions, and other companies serving consumers. But business professionals such as lawyers, accountants and business managers are increasingly at risk of attack, and may be less prepared to handle a cyber assault. Late last year, three Chinese…

Updated:

Engaging Cybersecurity Counsel Early – It’s the Right Choice

Last year, SEC Chair Mary Jo White named cybersecurity as the biggest risk facing financial markets. But the risk isn’t limited to the financial industry – even a casual review of breach reports in the mainstream press shows that cybersecurity is a risk common to all companies in any industry.…

Updated:

Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building

Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business disruptions. Just ask the owners of the Romantik Seehotel Jaegerwirt hotel, in the Austrian…

Updated:

The Human Firewall – The First Step to Cybersecurity

One of the challenges – perhaps the biggest challenge – to achieving cybersecurity is complexity.  Every day we are faced with new threats as hackers display their creativity and new technologies and approaches to addressing those threats.  Governments, both U.S. and foreign, regularly propose laws and regulations better to protect…

Updated:

Video & transcript: Why Companies need a cybersecurity training program

Co-chairs of the Jeffer Mangels Cybersecurity and Privacy Group, Robert E. Braun and Michael A. Gold, discuss why companies need a cybersecurity training program. The other videos in this 4-part series include: First steps to take when there’s a data breach at your company; Cybersecurity for middle market companies; and…

Updated:

Video & transcript: Cybersecurity for middle market companies

Co-chairs of the Jeffer Mangels Cybersecurity and Privacy Group, Robert E. Braun and Michael A. Gold, discuss cybersecurity for middle market companies. The other videos in this 4-part series include: Why companies need a cybersecurity training program; First steps to take when there’s a data breach at your company; and…

Updated:

Cyber Security: The long arm of the law gets a little longer

Multinational companies often face challenges in enforcing claims against their employees and agents located in foreign jurisdictions. In December 2012, a federal appeals court decision — MacDermid, Inc. v. Deiter, No. 11-5388-cv (2nd Cir. Dec. 26, 2012) — made enforcement a bit easier when a company goes after employees who…

Updated:

The Seven Deadly Sins of Data Security

There is no shortage of advice on how to secure electronic information. Companies can look to pronouncements by state and federal agencies (for example, the recent statements by the California Attorney General and the Federal Trade Commission on mobile application security), private industry (like the Payment Card Industry’s Data Security…

Updated:

The Bottom Line: Losing the Expectation of Privacy Bit by Bit, Byte by Byte

Published in The Bottom Line, the State Bar of California’s law Practice Management and Technology Section, as well as Hospitality Net, Hotel Online and ehotelier.com. Download a PDF of the article: Losing the expectation of privacy bit by bit, byte by byte   For a generation that has become exceedingly facile…

Contact Us