Podcast - The Role of Managed Service Providers with Stuart Itkin
Cybersecurity in Video Games & Esports
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Overview of Cybersecurity in Government Contracts
Cyber Threats
What to Do When a Phishing Attack Happens to You - The Consumer Finance Podcast
Hybrid Workforces and Compliance with Sheila Limmroth
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
Phishing: Cybersecurity’s Biggest Threat
Jenny Radcliffe on People Hacking
Debra Geroux and Scott Wrobel on Responding to Data Breaches
No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars
#WorkforceWednesday: Extended Remote Work, Return-to-Work Manager Training, Case to Watch - Employment Law This Week®
JONES DAY PRESENTS®: AI: Security and Privacy Risks with Big Data
Zoom Security Best Practices
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
Life With GDPR: Episode 24- Phishing
Making Cents of Your Cash Management Agreements
23andMe agreed to pay $30 million and provide three years of security monitoring to settle a lawsuit accusing the genetics testing company of failing to protect the privacy of 6.9 million customers whose personal information...more
The Third Circuit Court of Appeals has given new life to a putative class action suit led by a former employee of a company that suffered a ransomware attack, leading to her sensitive information being released onto the Dark...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
The Eleventh Circuit Court of Appeals is considering an appeal from the United States District Court for the Middle District of Florida , in which the District Court ruled that a cyber insurance policy did not cover diversion...more
As an update to our March 8, 2022 blog post discussing coverage for phishing scams in the context of Ernst & Haas Mgt. Co. v. Hiscox, Inc., 23 F.4th 1195 (9th Cir. 2022), a new Alaska case relied on Ernst & Haas to find...more
Continued widespread cyber attacks have leaders in just about every industry wary and watchful, and insurance underwriters are no exception. Given the increase in claims from recent ransomware attacks, cyber insurers are...more
A federal district court in Dallas, Texas has held that an insured's commercial crime policies were not triggered by a $6 million phishing loss where the insured did not "hold" the stolen funds. The case is RealPage Inc. v....more
The start of a new year is always a good reminder to take some time to review key areas and assess whether changes are in order. There are many examples of this both personally and professionally, but a company’s insurance...more
Although it is logical that cyber attacks have risen during the pandemic, and there is anecdotal evidence that it is occurring, including our own experience, an interesting new report was recently released by Allianz, which...more
U.S. hospitals, already on the front lines of fighting the coronavirus pandemic, are now facing viral attacks by cybercriminals. More than 20 U.S. hospitals and health care organizations have reported their data being held...more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night....more
Organizations that meet the definition of "covered entity" under the Health Insurance Portability and Accountability Act of 1996 and its implementing regulations (HIPAA) must be diligent to maintain the privacy and security...more
The Federal Trade Commission recently issued a cyber guide that, while intended for small businesses, can be of help for all businesses. The purpose of the guide, which includes various modules, is to help smaller businesses...more
Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more
A new Sixth Circuit decision may signal an emerging trend on whether insurers must cover claims made by policyholders who fall victim to phishing scams....more
On insurance coverage issues, sometimes the boat seems to be listing in the wrong direction. For example, insurers have long tilted the decks to avoid coverage for “spoofing” attacks and similar kinds of email fraud by...more
Increasingly, insureds faced with cyber fraud losses are going to the courts to interpret their policies. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB 413 [The Brick Warehouse], and in Taylor &...more
On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more
This is not a drill. Companies and law enforcement agencies around the world have been left scrambling after the world’s most prolific ransomware attack hit over 500,000 computers in 150 countries over a span of only 4...more
On May 16, DocuSign confirmed that a data breach resulted in widespread malware phishing attacks targeting its customers. DocuSign provides electronic signature solutions for many companies in the mortgage banking industry...more
There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more
Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more
Representatives of Connecticut businesses and corporations, educational institutions, and state and local government attended Murtha Cullina’s March 2016 Cybersecurity Conference at the Quinnipiac University School of Law....more
Last year, we saw some major cyber breaches affect millions of Americans (remember the June 2015 hack of the federal Office of Personal Management that impacted over 20 million Americans?). Unfortunately, cyber-attacks do not...more