Close Contact Us
Tap Here To Call Us

Cybersecurity Lawyer Forum

Updated:

Social Media Can Be Hazardous to Your Cybersecurity Health Part 1: The Problem

It is difficult to overstate the current backlash against social media. Social media giants are under attack from virtually all sources, including both governments and individuals. The #humblebrag du jour is a social media addict publically stating the intent to close accounts, take social media sabbaticals, cull friend and follower…

Updated:

Overstate Your Cybersecurity at Your Peril – Lessons from the Equifax Data Breach

Looking back with the perspective of two years, the Equifax data breach still has many lessons to teach us. Unfortunately, some of the most important lessons are masked by the extremes of the errors that characterized the original breach, which include insider trading by top executives after the breach was…

Updated:

Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps: Part 1 – the Data Map

Complying with the California Consumer Privacy Act in 5 (more or less) Not So Easy Steps Part 1 of a Series First Steps First – the Data Map It is estimated that more than 500,000 companies are subject to the California Consumer Privacy Act (CCPA), many of them smaller and…

Updated:

Illinois Expands Protection of Biometric Information – Who’s Next? Opening the gates to expensive class actions and “sue and settle” lawsuits

By Michael Gold and Bob Braun A new ruling by the Illinois Supreme Court could trigger expensive class action lawsuits and private litigation against businesses, even where plaintiffs do not allege actual injury. The case demands attention, not only from those doing business in Illinois, but throughout the nation. The…

Updated:

Cybersecurity Predictions for 2019

In their column, Top 10 cybersecurity predictions for the new year, Robert Braun and Michael Gold, co-chairs of JMBM’s Cybersecurity & Privacy Group offer predictions on federal privacy legislation (they won’t pass any and if by chance they do, it won’t work), data localization (more companies will have to decide…

Updated:

Why is data security so hard in the hospitality industry? What can be done about it?

Written prior to Marriott International’s announcement on November 30, 2018 that a data breach exposed the private data of up to 500 million guests, Robert Braun, co-chair of JMBM’s Cybersecurity & Privacy Group, wrote the article Guest Privacy – It’s Your Business, published by HotelExecutive.com on December 2, 2018. In…

Updated:

Data Breaches and Cybersecurity: What the hospitality industry can learn from the Marriott breach

Today’s revelation by Marriott International that a data breach exposed the names and personal details of over 500 million guests sent a shudder throughout the hospitality industry worldwide. Hoteliers know they are an appealing target for hackers as their databases contain identifying and financial information for very large numbers of…

Updated:

Cyber Risk and Internal Accounting Controls: How Should Boards Respond?

The SEC warns public companies that lax cybersecurity practices could violate rules governing internal accounting controls, and offer nine scams as cautionary tales. The SEC has become increasingly active when it comes to cybersecurity. Last month, it issued an investigative report about Business Email Compromises (BCEs) involving nine public companies…

Updated:

Cyber Resiliency: Designing for Disaster

Cybersecurity is a method to protect your data and systems. Cyber resiliency is a way of doing business in the face of the inevitable. When Hurricane Michael struck the Florida Panhandle earlier this month, it wiped away wide swaths of Mexico Beach, a coastal town on the Gulf of Mexico.…

Contact Us