Technology ( Page 12 )

  • Home
  • Technology
  •  ( Page 12 )

It’s Time to Investigate Cyber Insurance

Most IT leaders plan for cyber-attacks by constructing firewalls and installing security hardware and software. Even so, with the widespread proliferation of malware, companies are finding that their IT infrastructure has been attacked, customer data has been compromised, the IT system is being held for ransom, and assets are missing. Almost every day there are ...
Read more

Preparing Today for Future Cyber Risks

While companies around the world are experiencing numerous benefits from online transactions and interactions, the accompanying risks remain less visible. Cyber threats continue to evolve and rapidly expand, in terms of sophistication, complexity and the scale of their consequences. Lone hackers have been replaced by well-funded and organized cyber-crime networks, state-backed groups, terrorist organizations, and ...
Read more

Recent Development in FTC vs. Wyndham Underscore Importance of Cybersecurity Vigilance in the Hospitality Industry

On Friday, March 27, the parties in FTC vs. Wyndham – a key data security case with the potential to deeply impact the hospitality industry’s cyber-security practices – filed special supplemental briefs that the Third Circuit Court of Appeals requested during oral arguments earlier in the month. A key question at issue in the case: is the industry ...
Read more

Don’t Forget Copiers, Scanners and Fax Machines in Your Data Security Program

Current generation multifunction printer/scanner/copier devices are convenient, inexpensive, and very popular. Often overlooked is the fact that most modern printers, copiers, and scanners have many of the same attributes of computers, and are just as vulnerable to the same kind of cyber exploits and attacks as computers. A truly comprehensive data security and privacy risk ...
Read more

Every Case Is an e-Discovery Case in Today’s Litigation Environment

Lawyers routinely negotiate the scope of litigation discovery demands. One such lawyer was recently faced with a wildly broad discovery demand for relevant emails from the time a product was manufactured more than fifteen years ago to the present. The lawyer deftly negotiated the demand down to five years before the incident at issue and ...
Read more

A Guide to Cyber Coverage

This article was first published in the ABA Coverage Journal July-August 2014, Vol. 24, No. 4. Unless you have been living under a rock for the past few years (without a wireless connection), you are likely familiar with the countless news stories that unfold every day reporting seemingly fantastic tales of cyber espionage, hacker attacks, ...
Read more

Hospitality Industry Risks: Data Privacy and Security

Most hospitality businesses allocate time and capital to efficiently collect and process data in order to improve sales, customer service and loyalty, and operations efficiency. Technological advances have made it easier to manage a wide range of information about customers, vendors, and employees. Virtually all businesses that use computer systems are to some extent vulnerable ...
Read more

Cyber Crime Fighting

As personal, commercial, and government activities continue to migrate to the digital realm, so do criminals. Large-scale cyber attacks are becoming more frequent and more costly for businesses in the United States. Attackers are better funded, more sophisticated, and better organized than in the past, often representing criminal networks or states. Dozens of US banks ...
Read more