Public Service Announcement: Social media use increases your cybersecurity exposure. Share appropriately. If that were all it took. In my earlier post, I described how casual use of social media (that is, failure to take into account its impact on privacy and security) can put your company’s information security profile…
Cybersecurity Lawyer Forum
Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps: Part 2 – the Breach Response Plan
Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps Part 2 of a Series What’s Next – the Breach Response Plan This is the second in a series of articles on complying with the California Consumer Privacy Act (CCPA). The CCPA is estimated…
Social Media Can Be Hazardous to Your Cybersecurity Health Part 1: The Problem
It is difficult to overstate the current backlash against social media. Social media giants are under attack from virtually all sources, including both governments and individuals. The #humblebrag du jour is a social media addict publically stating the intent to close accounts, take social media sabbaticals, cull friend and follower…
Overstate Your Cybersecurity at Your Peril – Lessons from the Equifax Data Breach
Looking back with the perspective of two years, the Equifax data breach still has many lessons to teach us. Unfortunately, some of the most important lessons are masked by the extremes of the errors that characterized the original breach, which include insider trading by top executives after the breach was…
Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps: Part 1 – the Data Map
Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps Part 1 of a Series First Steps First – the Data Map It is estimated that more than 500,000 companies are subject to the California Consumer Privacy Act (CCPA), many of them smaller and…
Illinois Expands Protection of Biometric Information – Who’s Next? Opening the gates to expensive class actions and “sue and settle” lawsuits
By Michael Gold and Bob Braun A new ruling by the Illinois Supreme Court could trigger expensive class action lawsuits and private litigation against businesses, even where plaintiffs do not allege actual injury. The case demands attention, not only from those doing business in Illinois, but throughout the nation. The…
Cybersecurity Predictions for 2019
In their column, Top 10 cybersecurity predictions for the new year, Robert Braun and Michael Gold, co-chairs of JMBM’s Cybersecurity & Privacy Group offer predictions on federal privacy legislation (they won’t pass any and if by chance they do, it won’t work), data localization (more companies will have to decide…
Why is data security so hard in the hospitality industry? What can be done about it?
Written prior to Marriott International’s announcement on November 30, 2018 that a data breach exposed the private data of up to 500 million guests, Robert Braun, co-chair of JMBM’s Cybersecurity & Privacy Group, wrote the article Guest Privacy – It’s Your Business, published by HotelExecutive.com on December 2, 2018. In…
Data Breaches and Cybersecurity: What the hospitality industry can learn from the Marriott breach
Today’s revelation by Marriott International that a data breach exposed the names and personal details of over 500 million guests sent a shudder throughout the hospitality industry worldwide. Hoteliers know they are an appealing target for hackers as their databases contain identifying and financial information for very large numbers of…
Cyber Risk and Internal Accounting Controls: How Should Boards Respond?
The SEC warns public companies that lax cybersecurity practices could violate rules governing internal accounting controls, and offer nine scams as cautionary tales. The SEC has become increasingly active when it comes to cybersecurity. Last month, it issued an investigative report about Business Email Compromises (BCEs) involving nine public companies…