Sweeping statements made in an Executive Order issued five days into the Trump administration have cast doubt on the legal status of the EU-US Privacy Shield and have caused at least one highly-placed EU politician to...more
As their methods evolve, cybercriminals are increasingly targeting regional manufacturing businesses with sophisticated and potentially costly attacks. A recent ransomware attack on a mid-sized manufacturer in the Southeast...more
The cyber war battlefield has expanded, and your business is now a fighter and a target.
A new U.S. Government report explains many reasons for identifying and penalizing Russian hackers, the Russian intelligence...more
Michigan State University’s announcement earlier this month that hackers had gained access to a school database of about 400,000 records highlights why colleges and universities are such tempting targets for hackers and just...more
Data breaches. Stolen passwords. Confidential data compromised.
We’ve all heard the cybersecurity horror stories. In fact, we may have heard them too often.
According to a new study by National Institute of...more
One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more
4/18/2016
/ Attorney General ,
Board of Directors ,
Cyber Threats ,
Cybersecurity ,
Data Breach Plans ,
Employee Training ,
Federal Trade Commission (FTC) ,
Hackers ,
NIST ,
Popular ,
Reasonable Care ,
Security Audits ,
Vulnerability Assessments
We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more