News & Analysis as of

Cyber Crimes Encryption

Constangy, Brooks, Smith & Prophete, LLP

NY-licensed financial services companies must harden incident response plans, improve breach readiness by November 1

New York’s Cybersecurity Regulation continues its phased roll-out on November 1, when licensed financial services companies face a host of new requirements aimed at bolstering breach readiness and improving their ability to...more

Epiq

The Importance of Data Security in Bankruptcy Claims

Epiq on

Data security is a major concern across virtually all areas of the legal profession particularly in 2024 thanks in part to a record-breaking number of cyber incidents last year that cost companies an average of $4.45 million...more

Hogan Lovells

FBI obtains 7,000 LockBit decryption keys providing some victims relief

Hogan Lovells on

Victims of LockBit ransomware attacks can reach out to the FBI for decryption keys and all companies can prepare against ransomware attacks. The FBI secured 7,000 LockBit decryption keys, providing victims of LockBit...more

Mitratech Holdings, Inc

Caution! Credential Stuffing on the Rise

If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more

Cozen O'Connor

AG James Alleges Sporting Goods Retailer Whiffed on Defending Consumer Data

Cozen O'Connor on

New York AG Letitia James settled with Sports Warehouse, Inc. and affiliated entities to resolve allegations that the online sporting goods retailer maintained poor data security practices that led to the compromise of...more

Pillsbury - Internet & Social Media Law Blog

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one...more

Lowenstein Sandler LLP

Ransomware Case Signifies Shift In Cyber Insurers' Stance

Lowenstein Sandler LLP on

Ransomware attacks are on the rise. Lax security measures, which have become more acute in the work-from-home environment, continue to be exploited. Companies' systems are hacked into, their data is encrypted, and they face...more

Lowenstein Sandler LLP

Riding the Wave of Cyber Insurance Claim Payments: A Trend Cresting or Crashing?

Lowenstein Sandler LLP on

Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more

Esquire Deposition Solutions, LLC

Staying Secure in the New Hybrid Workplace

Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more

TransPerfect Legal

The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

TransPerfect Legal on

The Colonial Pipeline ransomware attack was the largest in the energy sector to date, and with cybercrimes up 100% from 2019 to 2020 this is only the beginning for 2021. Many organizations are taking on a digital...more

Association of Certified E-Discovery...

Coronavirus Home Office Security – Practical Tips for Securing Your “New” Home Office

I’ve been working as an independent consultant for quite some time. Along the journey, I’ve picked up many tips and tricks to maximize productivity while working from home with great results. There have been many articles...more

Faegre Drinker Biddle & Reath LLP

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCAM). NCAM serves as a timely reminder to continue to assess and improve organizational cybersecurity. In honor of NCAM, here are five fundamental steps that every...more

Fisher Phillips

Security Breaches In Schools: 10 Steps To Protect Your Information

Fisher Phillips on

California’s San Diego Unified School District recently disclosed that it had sustained a data breach when multiple phishing emails from malicious hackers were used to gather login information of staff members throughout the...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 14

Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Foreclosure stats are a far cry from their heights in the aftermath of the 2008 economic crisis. But the big news in the industry is the rise of party players that were barely a blip on the scene (if around at all) 10 years...more

Robinson+Cole Data Privacy + Security Insider

Massachusetts Data Breach Notification History Now Available Online

The Massachusetts Office of Consumer Affairs and Business Regulation (OCABR) has published an online list of data breach notifications issued each year to Massachusetts residents since 2007, the inception of the...more

King & Spalding

DOJ Criminal Chief Continues Push For More Access To Encrypted Data

King & Spalding on

On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

Ballard Spahr LLP

California Updates Data Breach Notification Statute

Ballard Spahr LLP on

Three bills that will update California’s data breach notification requirements have been signed into law by Governor Jerry Brown. The bills impose specific requirements on providing breach notification to consumers, add a...more

Davis Wright Tremaine LLP

California Beefs Up Encryption & Notice in Data Breach Law

On October 8, 2015, California Governor Jerry Brown signed A.B. 964 and S.B. 570 into law, a pair of bills that amended the Golden State’s data breach notification statute (Ca. Civ. Code § 1798.82). The amendments...more

Kelley Drye & Warren LLP

California Enacts Three Bills Amending Breach Notification Statute

Kelley Drye & Warren LLP on

Last week, California Governor Jerry Brown signed into law three bills that revise California’s data breach notification statute. The bills, which take effect January 1, 2016, establish specific formatting requirements for...more

Orrick, Herrington & Sutcliffe LLP

California Updates its Data Breach Notice Statute (Again)—What You Need to Know

On October 6, California Governor Jerry Brown signed legislation updating California’s data breach notice statute for the third time in three years.  The news was quickly overshadowed by the CJEU’s decision invalidating the...more

BakerHostetler

California Amends Its Breach Notification Statute

BakerHostetler on

For the third time in as many years, California has once again amended its breach notification statute. This time it expanded the definition of “personal information,” clarified the term “encryption,” and mandated additional...more

Foley & Lardner LLP

SEC Brings First Cybersecurity Enforcement Proceeding in Wake of Risk Alert

Foley & Lardner LLP on

Highlights Areas of High Risk and Examination Priorities for Financial Industry Firms - On September 15, the U.S. Securities and Exchange Commission’s (SEC’s) Office of Compliance, Inspections and Examinations (OCIE),...more

Carlton Fields

Don’t Get Locked Out: Is Ransomware a Threat to Your Business?

Carlton Fields on

Ransomware is a type of malware that locks access to a computer and its drives. Many forms of ransomware take complete control of the computer system, encrypt all of the files, and deny access to the system and any files...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide