Latest Posts › Data Privacy

Share:

Have You Thought About Encrypting Your Company's Data, And Its Communications? Perhaps You Should

Alright. So, you’ve battened down the hatches of your company’s premises, to protect your employees and your information. Employees are required to create secret computer passwords they’re not to share with anyone, even...more

Cybersecurity Insurance: Does Our Business Need It?

By now, we are all too familiar with the issues and pitfalls associated with cybersecurity breaches in a multitude of industries. Consider Equifax, Home Depot, Yahoo or Target, to name a few. Those well-publicized incidents...more

Are You Carefully Vetting Your Third Party Vendors? If Not, You May Be Buying Yourself a Breach of Privacy Claim  

Our client, we’ll call them Company X, provides installation, connection, upgrades and repairs for one of the country’s largest providers of residential and commercial television, telephone and Internet service. We’ll call...more

Security Breached – Tips for Mitigating and Protecting Private Information from Inside and Outside Threats

If you’re going to demote or terminate your in-house tech expert, you should plan that event very carefully. Our firm is now helping a client with damage control and data recovery upon discovering – a week after their...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide