Alright. So, you’ve battened down the hatches of your company’s premises, to protect your employees and your information. Employees are required to create secret computer passwords they’re not to share with anyone, even...more
By now, we are all too familiar with the issues and pitfalls associated with cybersecurity breaches in a multitude of industries. Consider Equifax, Home Depot, Yahoo or Target, to name a few. Those well-publicized incidents...more
2/21/2019
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Employer Liability Issues ,
Hackers ,
Insurance Industry ,
Popular
Our client, we’ll call them Company X, provides installation, connection, upgrades and repairs for one of the country’s largest providers of residential and commercial television, telephone and Internet service. We’ll call...more
If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully.
Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more
3/26/2018
/ Chief Technology Officer (CTO) ,
Computer Fraud and Abuse Act (CFAA) ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Defend Trade Secrets Act (DTSA) ,
Former Employee ,
Personally Identifiable Information ,
Popular ,
Proprietary Information ,
Restraining Orders ,
Risk Mitigation