Technology ( Page 6 )

  • Home
  • Technology
  •  ( Page 6 )

No one likes a copycat: How to avoid and protect yourself from a spoofed travel website

Many people are aware of email phishing schemes fraudsters use to collect personal information from unsuspecting victims. But many haven’t heard of another phishing method used by scammers, often unnoticeable to the naked eye—spoofed websites. This growing problem isn’t reserved for only banking or e-commerce sites. ARC recently reported two business travel agencies have fallen victim to ...
Read more

Surf’s Up! Don’t Become The Next Victim Of A Surfing Suit

The past few years have seen a steep increase in litigation brought against hospitality businesses under Title III of the Americans with Disabilities Act (ADA). These suits often contend that certain aspects of a building, bathroom, or parking lot do not comply with the ADA’s detailed standards and regulations. With the goal of creating a ...
Read more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this year. Indeed, the majority of all U.S. businesses have experienced at least one cybersecurity incident in the last year, with some ...
Read more

6 Ways to Protect Yourself Against a Data Breach

The threat of credit card data breaches and hacks throughout companies is unfortunately becoming more common as the world expands globally and technologically. As a traveler, the last thing you want to worry about is whether or not a stranger will gain access to your personal and company information through your credit card or other ...
Read more

What American Companies Need to Know about the EU’s New General Data Protection Regulation

The General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe that will go into force on May 25, 2018. Every organization that does business with EU customers, regardless of the home base of the organization, and regardless of the size of the organization, must come into compliance or risks ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

How to Protect Your Online Privacy

On a daily basis, the global media reports a huge loss of personnel data, damaged reputations, pilfered intellectual property, or millions of dollars stolen as the result of cyber incidents. An event reported in the news today will likely be eclipsed in scale or audacity in a few months’ time. Neither banks, global corporations, celebrities, ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

The traveler’s guide to keeping electronic devices secure during international travel

From the first time I traveled overseas in 1996 to my most recent international trip this past November it’s safe to say that international communication has gotten a little easier. Smartphones, laptops, high-speed wireless networks and wifi have made staying connected to home while you’re abroad a trivial task. Unfortunately that massive leap forward in ...
Read more

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand the risks and be prepared. To help, the National Institute of Standards and Technology (NIST) ...
Read more