{ Banner Image }

Showing 39 posts in Cybersecurity.

Pros and Cons of Software as a Service ("SaaS")

Today, the use of software as a service ("SaaS") is widespread and the cybersecurity considerations are an afterthought. Read More ›

Categories: Cloud Computing, Cybersecurity, Did you Know?, IT Contracts, Technology

Are Ransomware Payments Tax Deductible?

Earlier this year it was revealed that hackers had seized 1.5 terabytes of data from HBO, and over the course of the summer the hackers released the stolen property, including script summaries for "Game of Thrones," as well as scripts and entire seasons of other HBO shows. Read More ›

Categories: Cybersecurity

Equifax or EquiFaux Pas: Updates on the Equifax Breach

In September 2017, credit reporting agency Equifax announced that personal information for over 140 million U.S. consumers was potentially compromised. Equifax’s forensic investigations have put the number closer to 145.5 million. The compromised data includes names, social security numbers, birth dates, addresses, driver’s license numbers and even credit card numbers. Within a matter of weeks after the breach, Equifax’s CEO, Richard Smith, announced he was stepping down. It soon became clear that Equifax’s troubles were just beginning. Read More ›

Categories: Cybersecurity, Did you Know?, Digital Assets

Wire Transfer Attacks are Increasing: Here’s What Companies Can Do to Prevent Them

In our fast-paced, interconnected business world, the ability to quickly, easily and safely wire money is essential. Companies rely on wire transfers to complete transactions and keep supply chains moving. But with this convenience comes risks. Read More ›

Categories: Cybersecurity

HHS Office for Civil Rights Publishes Checklist for HIPAA Covered Entities Responding to Cybersecurity Incidents

The U.S. Department of Health and Human Service's Office for Civil Rights ("OCR") recently published guidance for entities covered by HIPAA, entitled "My entity just experienced a cyber-attack! What do we do now?" Read More ›

Categories: Cybersecurity, Digital Assets, Electronic Health Records, Fraud & Abuse, HIPAA

Ethical Considerations for Attorneys in the Age of Technology

In today's world, technology is ever changing and data breaches are widespread. Both have repercussions for the legal profession. As technology has evolved and become more intrusive, the obligations of attorneys and how attorneys handle client matters has also evolved. Read More ›

Categories: Cybersecurity, Digital Assets

If You Think Consequences from a Cyber Data Breach Aren’t Real…Just Ask Target

CyberSecurityCyber attacks can be costly. Target recently reached a settlement with 47 states to pay $18.5 million, the largest multistate data breach settlement to date. In November 2013, Target's systems were infiltrated and 40 million customers' payment card information was stolen as was the personal information of 60 million customers. In addition to the settlement, Target paid for free credit monitoring services for consumers affected by the breach as part of a $10 million class-action lawsuit settlement.  Read More ›

Categories: Cybersecurity, News

Cyber-Security: It's Not If, It's When

We are all at risk for a cybersecurity breach. Speakers from Michigan State University, ASK and Foster Swift will help you determine the legal and technical processes you need to have in place. Learn more in this short video. Read More ›

Categories: Cybersecurity, News

The Department of Justice Issues Recommendations for Preparing for Cybersecurity Threats

cybersecurity threatsThe recently formed Cybersecurity Unit of the Criminal Division of the Department of Justice (the “DOJ”) recently issued guidance regarding best practices for organizations to protect against and respond to cybersecurity risks. The guidance, titled “Best Practices for Victim Response and Reporting of Cyber Incidents,” was drafted with smaller organizations in mind, but has relevance to larger ones as well.

What to Do in Advance of a Breach

The DOJ urges organizations to prepare an incident response plan before a breach occurs, and recommends that an organization do the following: Read More ›

Categories: Cybersecurity, News