Typically, we beat the drum of the need to prepare for a data incident—anything from a full-blown ransomware attack to an employee accidently sharing data with the wrong person—by having your Incident Response Plan developed...more
9/29/2023
/ ATMs ,
Casinos ,
Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Employee Training ,
Hackers ,
Incident Response Plans ,
LinkedIn ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
Risk Assessment ,
Risk Management
Companies in all industries and of all sizes are evaluating sophisticated and useful technology for their websites and applica- tions (their “apps”) in an effort to enhance and develop their image or brand and to support...more
8/29/2023
/ Consent ,
Cookies ,
Cybersecurity ,
Data Protection ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Healthcare ,
Information Technology ,
Invasion of Privacy ,
Mobile Apps ,
PHI ,
Risk Management ,
Tracking Systems ,
Web Tracking ,
Websites ,
Wiretapping
Companies continue to see headlines about cyberattacks, but manufacturing companies, specifically, have become more targeted in the last few years. In the most recent issue of The Illinois Manufacturer, Molly Arranz and Sofia...more
2/24/2022
/ Cyber Attacks ,
Cybersecurity ,
Information Technology ,
Internet of Things ,
Manufacturing Facilities ,
Popular ,
Ransomware ,
Supply Chain ,
Technology Sector ,
Training ,
Unauthorized Access
In today’s digital age, employers store immense amounts of information, including confidential and proprietary information, on their on-premises systems, cloud-servers and other data storage solutions. With this collection of...more
11/9/2021
/ Computer Fraud and Abuse Act (CFAA) ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Security ,
Defend Trade Secrets Act (DTSA) ,
Hackers ,
Passwords ,
Popular ,
Termination ,
Van Buren v United States
In reaction to the continued uptick in high profile data incidents, yesterday, Wisconsin Governor Evers signed into law Act 73, a law establishing cybersecurity requirements for the insurance industry’s protection of data...more
The Small Business Administration (SBA) has been added to the list of organizations recently targeted by cyber threat actors. The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA)...more
For most businesses the mass transition to working from home during COVID-19 shelter in place orders is a new venture. However, with this (temporary) transition from operating out of the same building, what should remain is...more
Due to COVID-19, everyone has been adjusting to daily life from home, including the youngest family members. Education is coming in the form of rapidly-developing technology that provides cybernetic classes and hangouts and...more
The #1 weakness of a business for cyber security can be users of that technology. From employees to management and those in the C-suite, anyone can fall victim to business email compromise (BEC). That was true when companies...more
Last year, the California legislature passed the California Consumer Privacy Act (CCPA). This law, which has privacy professionals buzzing, takes effect on January 1, 2020. Although it is a California law, do not discount the...more
If you are an insurance provider, you are already awash in regulatory quagmires. Now, you can add one more. In fact, if you don’t have a comprehensive data privacy and security plan in place, then you may not be in compliance...more
The following scenario may sound familiar. It’s a busy afternoon, and your operations manager gets a call from a driver. She’s stuck in the middle of a highway, and her truck died without warning. Naturally, there’s an...more
On May 25th, a monumental data-breach land shift will occur. As the U.S. kicks-off Memorial Day celebrations, residents of the European Union will enjoy the first days of enforcement of the EU’s General Data Protection...more