Last Friday, July 12, 2024, it was widely reported that AT&T experienced another catastrophic cyber-attack. This material cyber incident affected over 100 million of its wireless customers according to AT&T’s 8-K Filing with...more
7/18/2024
/ AT&T ,
Cloud Computing ,
Cyber Insurance ,
Data Breach ,
Data Privacy ,
Form 8-K ,
Securities and Exchange Commission (SEC) ,
Software ,
Telecommunications ,
Vendors ,
Wireless Industry
As we promised a trilogy in our earlier 2024 CMMC Blog – “Get Ahead of Compliance: The Proposed Rule for the Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!” – we continue our series with a discussion of each...more
6/5/2024
/ Controlled Unclassified Information (CUI) ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Defense Contracts ,
Defense Sector ,
Department of Defense (DOD) ,
Department of Industrial Relations ,
Federal Acquisition Regulations (FAR) ,
Federal Contractors ,
NIST ,
Risk Assessment ,
Subcontractors ,
Suppliers
The expansion of the FTC’s Safeguards Rule will require businesses to notify customers and the FTC of cyber breaches that had previously been excluded from reporting requirements. Previously, only banks had been required to...more
1/15/2024
/ Code of Federal Regulations (CFR) ,
Compliance ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Federal Trade Commission (FTC) ,
Financial Institutions ,
Financial Services Industry ,
General-Business ,
Gramm-Leach-Blilely Act ,
Incident Response Plans ,
Notification Requirements ,
Personally Identifiable Information ,
Popular ,
Reporting Requirements ,
Safeguards Rule
As a lawyer working in a firm with a sophisticated legal team providing robust regulatory, government contract, and cybersecurity services, our Christmas present and holiday reading arrived early with the publication of the...more
The US Small Business Administration (“SBA”) has a long history of supporting socially and economically disadvantaged business owners under Title 15, Chapter 14A, Sections 636(j)(10) and 637(a) of the United States Code. One...more
12/1/2023
/ Affirmative Action ,
Business Development ,
Equal Protection ,
Federal Contractors ,
Fifth Amendment ,
Joint Venture ,
Minorities ,
Rebuttable Presumptions ,
SBA ,
Service Contracts ,
Small Business ,
USDA
The consequences of a cyber attack can be significant and wide-ranging for both an individual and a business – no matter how big or small. Cyber attacks can result in serious data breaches that lead to the theft or exposure...more
8/11/2023
/ Compliance Management Systems ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Liability ,
NIST ,
Popular ,
Reputation Management ,
Risk Assessment ,
Service Level Agreements
Biometric data refers to an individual’s physical attributes such as fingerprints, facial recognition, or Iris scans for the purpose of identification. This type of data is currently being used by many government agencies for...more
For anyone who has ever put a home for sale understands there are a lot of steps that must be taken to make real estate “showcase” ready for prospective buyers. These steps may include de-cluttering, new paint, modern...more