Most IT leaders plan for cyber-attacks by constructing firewalls and installing security hardware and software. Even so, with the widespread proliferation of malware, companies are finding that their IT infrastructure has been attacked, customer data has been compromised, the IT system is being held for ransom, and assets are missing. Almost every day there are ...Read more
While companies around the world are experiencing numerous benefits from online transactions and interactions, the accompanying risks remain less visible. Cyber threats continue to evolve and rapidly expand, in terms of sophistication, complexity and the scale of their consequences. Lone hackers have been replaced by well-funded and organized cyber-crime networks, state-backed groups, terrorist organizations, and ...Read more
Recent Development in FTC vs. Wyndham Underscore Importance of Cybersecurity Vigilance in the Hospitality Industry
On Friday, March 27, the parties in FTC vs. Wyndham – a key data security case with the potential to deeply impact the hospitality industry’s cyber-security practices – filed special supplemental briefs that the Third Circuit Court of Appeals requested during oral arguments earlier in the month. A key question at issue in the case: is the industry ...Read more
Current generation multifunction printer/scanner/copier devices are convenient, inexpensive, and very popular. Often overlooked is the fact that most modern printers, copiers, and scanners have many of the same attributes of computers, and are just as vulnerable to the same kind of cyber exploits and attacks as computers. A truly comprehensive data security and privacy risk ...Read more
Lawyers routinely negotiate the scope of litigation discovery demands. One such lawyer was recently faced with a wildly broad discovery demand for relevant emails from the time a product was manufactured more than fifteen years ago to the present. The lawyer deftly negotiated the demand down to five years before the incident at issue and ...Read more
I’d like to thank Sarah Phaff of our Macon, Georgia, office, who wrote this post with me. As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty of ...Read more
This article was first published in the ABA Coverage Journal July-August 2014, Vol. 24, No. 4. Unless you have been living under a rock for the past few years (without a wireless connection), you are likely familiar with the countless news stories that unfold every day reporting seemingly fantastic tales of cyber espionage, hacker attacks, ...Read more
Most hospitality businesses allocate time and capital to efficiently collect and process data in order to improve sales, customer service and loyalty, and operations efficiency. Technological advances have made it easier to manage a wide range of information about customers, vendors, and employees. Virtually all businesses that use computer systems are to some extent vulnerable ...Read more
As personal, commercial, and government activities continue to migrate to the digital realm, so do criminals. Large-scale cyber attacks are becoming more frequent and more costly for businesses in the United States. Attackers are better funded, more sophisticated, and better organized than in the past, often representing criminal networks or states. Dozens of US banks ...
Tags DeloitteRead more
If there was one thing I wish that every business owner, manager and employee would take away when thinking about this article and the modern workplace, it is that e-mails are forever. And not only are they forever, but they pack a double punch since their impact is instantaneous. All it takes is a simple ...
Tags Cozen O'ConnorRead more