Hybrid Workforces and Compliance with Sheila Limmroth
In one of the most clear-eyed and sobering assessments of the cyberthreat China poses to our nation’s critical infrastructure, the country’s foremost cybersecurity leaders recently testified that the Chinese Communist Party...more
Data security is a top concern for organizations in today’s digital landscape. It protects data from unauthorized access, use, modification, or disclosure, and requires implementing technical, administrative, and physical...more
The term cybersecurity is thrown about because it covers so many risks. There is no common definition of cybersecurity and the technical elements included in the term. From a technical standpoint, cybersecurity covers...more
A joint advisory issued June 7, 2022, by the Cybersecurity & Infrastructure Security Agency, FBI and the National Security Agency entitled “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and...more
CYBERSECURITY - DOJ Takes Down RaidForums' Website - In an action against what has been described as one of the largest hacker forums in the world, the U.S. Department of Justice (DOJ) announced on April 12, 2022, that...more
U.S. officials this week warned government agencies, cybersecurity personnel, and operators of critical infrastructure that Russia might launch cyber-attacks against Ukrainian and U.S. networks at the same time it launches...more
In our first article to kick off Cybersecurity Awareness Month, we will discuss some steps businesses can take to improve their cyber hygiene. Over the past few years, some of the largest and well-known companies have been...more
The past two decades have produced intense focus on information security to protect data. This priority remains important. But the change in administrations and the Continental Pipeline incident have redirected attention...more
Although executives of organizations report that ransomware is their number one security concern, and 87 percent of them expect an increase in cyber-attacks against their organizations over the next year, only one-third of...more
The California Attorney General ("AG") has issued guidance reminding health care providers of their duty to report health care data breaches and to comply with other state and federal data privacy laws....more
We have (rightly) harped on the necessity of unique and complex passwords, strengthened by multi-factor authentication (temporary text codes, rolling RSA numbers, secret answers to questions, fingerprint or facial...more
Some have used the pandemic, and now the extended inclement weather, to learn to play a musical instrument, speak a new language or another new skill. If those are beyond any of your reasonable expectations, do not simply...more
The new measure, which will come into effect on June 1, 2020, will potentially affect operators of critical information infrastructures as well as their domestic and overseas suppliers. Affected companies should now take...more
On June 27, 2019, the EU Regulation on Information and Communication Technology (Cybersecurity Act or Act) became effective introducing, for the first time, EU-wide rules for the cybersecurity certification of products and...more
The cybersecurity classified protection regime attracted significant attention when it was included in the Peoples Republic of China (PRC) Cyber Security Law promulgated in 2017 (the CSL). The CSL mandates that network...more
Public Wi-Fi networks are a wonderful thing, particularly if you subscribe to a limited carrier data plan and have spent the month streaming Bachelor in Paradise or your favorite NCAA and NFL teams’ games. However, by...more
Late last week, the Federal Bureau of Investigation (FBI) issued a warning to U.S. consumers that Russian hackers (dubbed Sofacy and a/k/a Fancy Brear and APT28 and believed to be backed by the Russian government) had...more
Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more
We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more
On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more
The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more
Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more
Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more
Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more