This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
9/20/2024
/ California Privacy Rights Act (CPRA) ,
Class Action ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Duty of Care ,
Employee Training ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Intellectual Property Protection ,
Manufacturers ,
Noncompliance ,
Theft ,
Trade Secrets
As the manufacturing sector continues to embrace the hyper-connected era of Smart Manufacturing, known as Industry 4.0, more and more organizations are integrating advanced automation, artificial intelligence (AI), the...more
9/13/2024
/ Artificial Intelligence ,
Automation Systems ,
Corrective Actions ,
Cyber Attacks ,
Cybersecurity ,
Energy Sector ,
Intellectual Property Protection ,
Internet of Things ,
Machine Learning ,
Malware ,
Manufacturers ,
Ransomware ,
Reputational Injury ,
Risk Management ,
Sensitive Personal Information ,
Social Engineering ,
Supply Chain
The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more
8/26/2024
/ Credit Reports ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Security ,
Federal Trade Commission (FTC) ,
Fraud ,
Hackers ,
Identity Theft ,
IRS ,
Popular ,
Risk Assessment ,
Risk Management
In the hyper-connected era of smart manufacturing, accelerated by “Industry 4.0,” the manufacturing sector is undergoing a digital revolution. By leveraging technologies such as advanced automation, artificial intelligence,...more
9/25/2023
/ Artificial Intelligence ,
Automation Systems ,
Blockchain ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
DFARS ,
Employee Training ,
Energy Sector ,
FERC ,
General Data Protection Regulation (GDPR) ,
Healthcare ,
Internet of Things ,
Malware ,
Manufacturers ,
National Security ,
Pharmaceutical Industry ,
Popular ,
Social Engineering ,
State Sponsors of Cyberattacks ,
Supply Chain ,
Technology ,
Telecommunications ,
Transportation Industry ,
Vulnerability Assessments
On February 22, 2022, U.S. Department of Homeland Security Secretary Alejandro Mayorkas warned critical infrastructure organizations located in the United States of possible cyberattacks by Russian state-sponsored actors in...more
Security incidents, loss of customer data, exposure of confidential corporate assets, demands of ransom, and similar stories are becoming daily headlines with the impacts being felt across a wide variety of industries. We...more
10/24/2017
/ Confidentiality Policies ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Protection ,
Data Transfers ,
Hackers ,
Personally Identifiable Information ,
Privacy Policy ,
Ransomware ,
Risk Assessment ,
Third-Party Service Provider
The security breach announced by Equifax Inc. on September 7, 2017, grabbed headlines around the world as Equifax revealed that personal data of roughly 143 million consumers in the United States and certain UK and Canadian...more
9/14/2017
/ Breach Notification Rule ,
Canada ,
Corporate Counsel ,
Credit Reporting Agencies ,
Cyber Attacks ,
Data Breach ,
Equifax ,
EU ,
Fines ,
General Data Protection Regulation (GDPR) ,
Identity Theft ,
Incident Response Plans ,
Notice Requirements ,
Personally Identifiable Information ,
State Data Breach Notification Statutes ,
UK
Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000...more
As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more
5/26/2016
/ Cyber Attacks ,
Data Protection ,
Data Security ,
Email ,
Employee Training ,
Hackers ,
Health Care Providers ,
Hospitals ,
Phishing Scams ,
Popular ,
Ransomware ,
Social Media ,
Websites