News & Analysis as of

Hackers Identity Theft Cyber Threats

Arnall Golden Gregory LLP

Business Account Takeover Fraud: Pursuing the Platform Is Rarely the Answer

Business account takeover (“ATO”) fraud occurs where a threat actor gains access to a business account on a payments platform (e.g., a payroll or accounts payable tool) or fraudulently creates such an account and engages in...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - Chinese APT41 Attacking State Networks - Although we are receiving frequent alerts from CISA and the FBI about the potential for increased cyber threats coming out of Russia, China continues its cyber...more

Lowenstein Sandler LLP

Phishing: Cybersecurity’s Biggest Threat

Lowenstein Sandler LLP on

Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more

McDermott Will & Emery

[Webinar] Cutting Through the COVID-19 Chaos: Keeping Secrets in the Family (Office) - May 20th, 1:00 pm - 2:00 pm ET

McDermott Will & Emery on

Hope for the best, but plan for the worst. Join us as we address ways to protect family privacy from external threats, and policies and procedures for handling information that individual family members wish to keep private...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020

Robinson & Cole LLP on

Researchers at Sentinel One and Dragos have detected malicious code, called EKANS or Snake, that has been designed specifically to target industrial control systems (ICS), including those of oil refineries, manufacturing...more

Furia Rubel Communications, Inc.

Cybersecurity: How to Protect Yourself and Your Company

Just recently, Equifax had the largest-ever settlement for a data breach. They are to pay at least $575 million, and potentially as much as $700 million, to settle allegations over its massive 2017 data breach. What we tell...more

Foley Hoag LLP - Security, Privacy and the...

What is reasonable? The emerging legalities of cybersecurity post-Wyndham

This month’s edition of the Advanced Cyber Security Center’s newletter includes my discussion of lessons to be learned from the Wyndham decision: Historically, security was an issue reserved in a back room for the IT...more

Nossaman LLP

It’s Official: FTC Has the Authority to Police Cybersecurity

Nossaman LLP on

In a resounding win for the Federal Trade Commission (“FTC”), the Third Circuit unanimously affirmed the FTC’s power to regulate cybersecurity under the unfairness prong of the FTC Act (15 U.S.C. §45). FTC v. Wyndham, Case,...more

Robinson+Cole Data Privacy + Security Insider

OPM data breach update–$133 million contract awarded to vendor

The Office of Personnel Management (OPM) and the Defense Department announced this week that a Portland, OR based vendor has been selected to assist with breach notification and credit assistance for the almost 22 million...more

Pullman & Comley - Labor, Employment and...

You Can’t Just WISPer – Employers Must Publish or Display Security Policies

WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide