Close Contact Us
Tap Here To Call Us

Articles Posted in Risk Evaluation and Management

Updated:

Social Media Can Be Hazardous to Your Cybersecurity Health Part 2: Solutions

Public Service Announcement: Social media use increases your cybersecurity exposure. Share appropriately. If that were all it took. In my earlier post, I described how casual use of social media (that is, failure to take into account its impact on privacy and security) can put your company’s information security profile…

Updated:

Social Media Can Be Hazardous to Your Cybersecurity Health Part 1: The Problem

It is difficult to overstate the current backlash against social media. Social media giants are under attack from virtually all sources, including both governments and individuals. The #humblebrag du jour is a social media addict publically stating the intent to close accounts, take social media sabbaticals, cull friend and follower…

Updated:

Cyber Resiliency: Designing for Disaster

Cybersecurity is a method to protect your data and systems. Cyber resiliency is a way of doing business in the face of the inevitable. When Hurricane Michael struck the Florida Panhandle earlier this month, it wiped away wide swaths of Mexico Beach, a coastal town on the Gulf of Mexico.…

Updated:

California Consumer Privacy Act of 2018 – How You Can Prepare

On June 28, 2018, Governor Brown signed the California Consumer Privacy Act of 2018, which goes into effect on January 1, 2020. But – because of certain look-back features in the new law – significant compliance will be required by January 1, 2019. The Act is enforceable by the California…

Updated:

Responding to Ransomware

Agreeing to ransom terms is a losing proposition; spend your time and energy preparing for an attack. Ransomware attacks are on the rise, partly because of the ease and anonymity of crypto-currencies. In a typical ransomware attack, cyber criminals invade a computer system and encrypt key data, then threaten to…

Updated:

SEC Ramps Up Its Interest in Cryptocurrency Companies with Scores of Subpoenas

By David Ma and Robert Braun The Securities and Exchange Commission (SEC) could be on target to make 2018 the year of cryptocurrency regulation—or at least the start of it. In January, Jay Clayton, chair of the Securities and Exchange Commission, and J. Christopher Giancarlo, chair of the Commodity Futures…

Updated:

The U.S. Treasury Wants to Know Your Customers, No Matter What the Currency

FinCEN, the Financial Crimes Enforcement Network, has indicated that cryptocurrencies will not get an enforcement “pass.” By David Ma and Robert Braun The Treasury Department has outlined its efforts to police electronic currencies in a letter to Sen. Ron Wyden after the lawmaker asked what the department was doing to…

Updated:

What is Blockchain Good For? Here are some guidelines.

  Welcome to the third article in our series of blogs about blockchain technology and its impact on business practices, corporate governance and cybersecurity.     In Robert Braun’s article, Blockchain: The good, the bad, and how to tell the difference published by FinTech Weekly, he explores two issues about…

Updated:

The Four Horsemen of Cryptocurrencies: Volatility, criminal activity, security issues, and human error

  Welcome to the second article in our series of blogs about blockchain technology and its impact on business practices, corporate governance and cybersecurity.     In Robert Braun’s article, Cryptocurrencies – Does the Next Big Thing have Staying Power?, published by FinTech Weekly, he describes four challenges that arise…

Updated:

Cyberattacks on Hotels — What Should Hotel Owners and Operators Do?

This article was originally published by Hotel Business Review and is reprinted with permission from www.hotelexecutive.com. Almost as soon as there were data breaches, hotels became a prime target of hackers, and the hospitality industry has consistently been one of the most commonly targeted businesses. Since 2010, hotel properties ranging from…

Contact Us