News & Analysis as of

Data Protection Employee Training Risk Management

Integreon

Best Practices for Reducing the Cost of a Cyber Incident for Small to Mid-Sized Businesses

Integreon on

Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more

Society of Corporate Compliance and Ethics...

The EU AI Act: A comprehensive guide for organizations

The EU recently introduced the AI Act, landmark legislation aimed at regulating artificial intelligence (AI) technologies. This article provides an in-depth overview of the EU AI Act, its implications for organizations, and...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Dunlap Bennett & Ludwig PLLC

The Role Of A Cybersecurity Law Firm In Safeguarding Digital Assets

In today’s digital landscape, organizations face numerous cybersecurity threats that can compromise their valuable digital assets, including their data, IT infrastructure, networks, software, and intellectual property (IP)....more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #346 – Forbes’ Tips to Handle Consumer Privacy Concerns

I recently ran across a Forbes article that I thought was spot-on, so I am sharing it with our readers. Entitled “5 Tips For How To Handle Consumer Privacy Concerns,” the article astutely points out that “In the age of...more

NAVEX

The New Normal Workplace (pt. 1) – R&C Management

NAVEX on

Most businesses began 2021 with ambitions to return to the office. But in keeping with a trend of disruption, we are faced with new COVID variants, questions on when and how schools will respond, a cultural shift towards...more

Reveal

6 Steps to Implementing an Effective Corporate Compliance Strategy

Reveal on

It’s no secret that compliance is a huge part of a corporate lawyer’s job. Whether it’s internal or external compliance, there’s a lot that needs to be done to keep a business operating smoothly and on the right side of the...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Epstein Becker & Green

#WorkforceWednesday: Special Edition – The Chief Legal Officer’s Role in Transition Back to the Workplace - Employment Law This...

Epstein Becker & Green on

Welcome to #WorkforceWednesday. The Chief Legal Officer (“CLO”) plays a key role in supporting employers as the workforce transitions back to the workplace. This week we have a special edition for you. As enterprises...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Carlton Fields

Here Are Seven Phrases That Can Help Your Business Avert Cybersecurity Attacks

Carlton Fields on

It starts inconspicuously enough with an email. You’re busy, so without thinking, you quickly open it and view the attachment. You may have just compromised the security of your entire company and the privacy of every client....more

Miles & Stockbridge P.C.

Employees Are a Gatekeeper to Effective Data Security

Data security and privacy concerns have become one of the top issues keeping business leaders up at night. According to the Ponemon Institute’s 2018 study regarding the cost of data breaches, data breaches are increasingly...more

Robinson+Cole Data Privacy + Security Insider

Alert for Employee Education: FBI Issues Warning About Exploitation of “Secure” Websites

We all have been trained to look at website addresses with a critical eye to make sure they have “https,” as those websites are supposed to be secure. The “s” at the end signifies to us that it is secure. The lock at the...more

Sands Anderson PC

5 Easy Tips for Protecting Employee Data

Sands Anderson PC on

If you handle or maintain personal information about your employees, such as social security numbers and payroll information, you should take steps to protect that data....more

K&L Gates LLP

Digital Crisis PR: Top five digital precautions for universities

K&L Gates LLP on

When it comes to digital threats, universities must protect not only a broad and deeply layered infrastructure, but also vast populations of students. In this episode, Elisa D’Amico and Desiree Moore outline their top five...more

Robinson+Cole Data Privacy + Security Insider

Addressing Insider Threats

In data privacy and security jargon, an insider threat usually includes: an employee who creates a security risk due to a lack of awareness or carelessness, but doesn’t mean to do...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hospitals In The Crosshairs: Managing Cybersecurity Risk (2)

In our last article, we showed you how to evaluate where your organization sits on the landscape of readiness and preparedness. In this concluding article, we identify concrete steps you can immediately employ to move your...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #126 – Employee Training and Education Continues to be “Best” Cyberdefense

It is a myth that employees hate training and education. I have seen it with my own eyes. It is very exciting to watch an audience visibly cover their mouths when real life stories are told about cyber-attacks and phishing...more

Bradley Arant Boult Cummings LLP

Understanding cyber insurance risks of target companies

Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #116 - Insider Error or Threat Continue to Cause Data Breaches

You continue to hear that your employees are your biggest risk when it comes to causing a data breach. Recent incidents that we have been involved in that were caused by employee error include...more

Littler

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

NAVEX

Top 10 Ethics & Compliance Predictions and Recommendations for 2017

NAVEX on

Once again it’s time for our annual review of trends and events that will impact your Ethics and Compliance (E&C) program in the year ahead. This year presents a unique challenge. We are preparing our predictions...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Dorsey & Whitney LLP

Cybersecurity Compliance Just Got Tougher

Dorsey & Whitney LLP on

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

28 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide