Perhaps the easiest way for a business to find itself on a collision course with the Federal Trade Commission (FTC) is to make deceptive claims about its privacy and cybersecurity practices. Earlier this month, Uber agreed to a settlement with the FTC for doing just that.
Over the weekend a massive ransomware cyberattack hit over 200,000 victims in more than 150 countries. As I’ve said before, I believe that the frequency of these attacks will increase, and the ransom demands will grow. Given that many experts believe that the scope of this latest attack may continue to spread on Monday as people return to work, here are some basic tips.
Star Wars is in many ways a story about a data breach of the Empire’s plans for its most valuable IP- the Death Star plans, and the Empire’s poor response to the breach. On this Star Wars Day (May the Fourth), let’s look at some of the cybersecurity lessons learned.
Think there’s no hacking in baseball? Just like Tom Hanks’s character in A League of Their Own was wrong about there being “no crying in baseball”, it would be wrong to believe there is no hacking in baseball. Baseball’s opening day is just around the corner. While this offseason included the usual free agent signings (thank you, New York Mets for re-signing Yoenis Cespedes), trades, and contract extensions, it also included news about what may have been the first known case of computer hacking in baseball: the St. Louis Cardinals’ former Director of Baseball Development hacked the Houston Astros. In this article, I’ll cover some of the cybersecurity lessons that all organizations, Major League Baseball or otherwise, can learn from what happened.
Many attorneys feel overwhelmed by cybersecurity issues, stick their heads in the sand, and do nothing to protect their firm’s information. Part 1 of this article covered the reasons why law firms need to be concerned about cybersecurity, and why they need to actively protect their firm’s information. Now, part 2 will cover key elements of how law firms can address those concerns, and thereby: (1) decrease the odds of a cybersecurity incident or breach, and (2) increase their ability to detect, respond, and recover from one when (not if) it happens.
Every law firm will eventually have some kind of cybersecurity incident or breach (if they haven’t already). What sets those firms apart is: (1) how well they minimize the odds of an incident occurring, and (2) how well they’re able to detect, respond, and recover from one.