December is the month for predictions. During this month, commentators of all sorts and in all areas predict the trends and actions that will impact us during the coming year. While speculating the future is a questionable pursuit, we at the Cybersecurity Lawyer Forum would hate to be left out…
Articles Posted in Risk Evaluation and Management
Ignoring Cybersecurity – It’s Not an Option
Paralysis is one of the biggest obstacles to achieving a cybersecure environment. Companies are often unable to take the steps necessary to bring security to an enterprise. It’s not only common; it’s entirely understandable. Achieving cybersecurity appears to be an overwhelming task. Every day brings another headline announcing a data breach, or…
Cybersecurity Surveys – Key Takeaways
Spring is the season for many things, including the publication of cybersecurity surveys. In the past few months, Verizon has published its Data Breach Investigations Reports, Ponemon Institute Published its 2016 Study on How Organizations Manage Data Breach Exposures, the California Attorney General published its annual California Data Breach Report,…
Cybersecurity Alert: Business Management Firms and Family Offices
We are flooded with news reports of major data breaches and malware attacks. The reports focus on attacks against businesses with significant volumes of sensitive personal and financial information, like financial institutions, hospitals, retailers – and most recently, law firms. There is no question that the press pays the most…
California Proposition Would Expand Duties and Liabilities for Collecting Personal Information
On September 26, 2013, the California Secretary of State allowed proponents of a new ballot proposition to collect signatures for the “Personal Privacy Protection Act.” The Act, if approved, would radically change the privacy landscape in California by adding new provisions to the California Constitution. Most importantly, the Act (1)…
The Seven Deadly Sins of Data Security
There is no shortage of advice on how to secure electronic information. Companies can look to pronouncements by state and federal agencies (for example, the recent statements by the California Attorney General and the Federal Trade Commission on mobile application security), private industry (like the Payment Card Industry’s Data Security…