Constangy Clips Ep. 5 - Year-End Planning: 4 Tips for a Successful 2025
#WorkforceWednesday®: Mental Health Parity Rules, NLRB Restrictions, New York's Workplace Violence Prevention Law - Employment Law This Week®
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 34: Generations in the Workplace with Caroline Warner of the South Carolina Power Team, Part 2
Work This Way: A Labor & Employment Law Podcast - Episode 33: Generations in the Workplace with Caroline Warner of The South Carolina Power Team, Part 1
Back to School: 3 Essential Employee Trainings
The New EEOC Guidelines on Workplace Harassment
Managing Employee Compliance in Highly Regulated Industries — Hiring to Firing Podcast
What's the Tea in L&E? Supervisor Liability: What Managers Need To Know
Clocking in with PilieroMazza: The Labor Equation: Pricing for Success
Webinar: Is Your DEI Policy Setting You Up for a Lawsuit?
DE Talk Podcast | The Platinum Rule of Diversity, Equity, & Inclusion
DE Talk Podcast | Embracing Generational Differences at Work
What's the Tea in L&E? Truth Hurts or Rumors? Lizzo’s Harassment Allegations Serve As A Good Reminder
Transforming Leadership with Wisdom from the LGBTQ Community: On Record PR
DE Talk | From Human “Doing” to Human “Being”: Transforming to Own Your 50
Employment Law Now VII-137 - Training Managers to Manage and Avoiding The Peter Principle
DE Talk | Uncovering the Non-Traditional Workforce: Recruiting & Retaining Talent in Addiction Recovery
Cybersecurity: What Healthcare Providers Need to Know
DE Talk | Moving Off the DEIB “Treadmill” & Onto Progressive Change
Compliance Training & Adult Learning Theory
In the global trade universe, where time holds huge importance, weak security practices in your international operations could be detrimental to your business. Customs and Border Protection (CBP), the folks behind CTPAT, are...more
On October 2, 2024, New York adopted new regulations requiring general hospitals to implement heightened cybersecurity safeguards. General hospitals, as defined in Article 28 of the NY Public Health Law, generally must begin...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more
They appeared. They caused a fright. And then they disappeared… along with all of your data. While not a ghost, that is how most hacking groups operate and their ghostly presence is growing across the globe....more
Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more
The ubiquity of artificial intelligence (AI) has heightened companies’ exposure to cyberattacks of increasingly greater sophistication. Our Privacy, Cyber & Data Strategy Team explores how businesses can enhance their...more
You might have yet to hear of the NIS2 Directive, but you should be aware of it if you’re in any sector that relies on digital infrastructure. Whether you’re a business owner, IT professional, or curious about how the EU...more
Tuesday was HR Professionals Day, an annual celebration that recognizes the hard work of Human Resource personnel and highlights the unique challenges they face. HR departments are often maligned, but they ensure that...more
As healthcare technology continues to evolve, so does the need for robust compliance strategies to safeguard patient information and ensure the integrity of medical devices. In a joint September 19, 2024 presentation, the...more
This is the second article in our two-part series on Cybersecurity in the Age of Industry 4.0, focusing on the legal implications and potential liabilities manufacturers face from cyberattacks, as well as practical...more
Back to school season isn't just for the kids! Employee and management trainings are an essential tool for keeping your workplace running smoothly and compliant with employment, cybersecurity, and data privacy laws. In this...more
In an era of escalating cyber threats and evolving attack vectors, organizations can no longer rely solely on cybersecurity to protect their digital assets. Instead, they must develop a comprehensive cyber resilience strategy...more
The United States Department of Energy (“DOE”) has previously selected Arkansas Valley Electric Cooperative Corporation (“AVECC”) for a Smart Grid Grant (“Grant”). The Grant is awarded pursuant to the Bipartisan...more
Think of it as the compliance version of The Butterfly Effect – a small, unnoticed, action, or failure to act, somewhere in the organization that balloons over time into a much larger, material issue. Maybe an employee is...more
Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more
The increasing threat of cyberattacks against U.S. water supplies has raised significant concerns among federal officials, who emphatically stress the need for utilities to bolster their cybersecurity measures. A recent...more
In February 2024, the healthcare industry was rattled by a significant cyberattack targeting Change Healthcare (“Change”), a subsidiary of UnitedHealth Group, one of the largest health insurance companies in the world. The...more
Healthcare data breaches are occurring more frequently and on larger scales than ever before – and while you defend against cyberattacks and other external threats, make sure you do not overlook the critical role your...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
Cybersecurity success depends on more than just technology. As we’ve seen in part one and part two of this series on cybersecurity risk, the costs of a cyber attack are high – and bad actors always look for the easiest entry...more
Today is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. Given the large number of...more
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
Why does it matter to you? In February of 2024, Change Healthcare, a prominent player in the healthcare industry, fell victim to a ransomware attack that sent shockwaves through its systems and networks. The incident...more
In today's fast-paced digital world, organizations face an increasingly complex and evolving landscape of cyber threats. Cyberattacks are no longer a question of if but when, making it imperative for businesses to not only...more