Cyber Security

  • Home
  • Posts Tagged "Cyber Security"

Hospitality Cyber Threats Are Alive & Well – Lessons From Recent Incidents

The data incident involving the Starwood guest database was one of the most significant data security incidents in recent years. Publicly announced on November 30, 2018, the details revealed in the days and weeks following the announcement contain some striking reminders and new lessons for the hospitality industry. Here are some of the key facts ...
Read more

Preventing Cybercrime

HOW TO RESPOND TO COMPUTER POP-UPS. In addition to being annoying, computer pop-ups or notifications are often the first step a cyber-criminal uses to victimize unsuspecting users. Be cautious of any notification or pop-up messages. Examples include emails that say you have to download something in order to see a greeting card or a message ...
Read more

No One Likes Surprises – Corporate Counsel Lessons Learned by Clients

I. Introduction I often think of the words first heard spoken by the Fram Oil mechanic in the television commercial many years ago – “you can pay me now or you can pay me later.” The wisdom of this statement has been proven time and time again. Its application in the legal services context is ...
Read more

U.S. Companies Still Grappling With GDPR

Several months after the European Union’s (EU’s) new sweeping privacy law known as the General Data Protection Regulation (GDPR) went into effect on May 25, 2018, U.S. companies are still struggling to understand the implications for their businesses. This article highlights some of the key threshold issues that companies should consider in analyzing the potential ...
Read more

The Unique Challenges of Data Security in the Hospitality Industry

The hospitality industry has been in the news frequently over the past year as a result of multiple and significant data security incidents. Nationally recognized hotel and resort brands continue to suffer by cyber-attacks, including theft of payment card data from their retail and food/beverage outlets, and at times theft of guest data from reservations ...
Read more

Russian Hackers and Spanish Spyware Apps: The latest in FIFA 2018 Cybersecurity News

June 13: FIFA fans beware: If you attend the World Cup, and plan to take any form of computer or device with you, you are likely to be hacked. In fact, 72% of cybersecurity professionals anticipate an attack during the World Cup, which takes place in Russia over the next month. William Evanina, Director of ...
Read more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this year. Indeed, the majority of all U.S. businesses have experienced at least one cybersecurity incident in the last year, with some ...
Read more

6 Ways to Protect Yourself Against a Data Breach

The threat of credit card data breaches and hacks throughout companies is unfortunately becoming more common as the world expands globally and technologically. As a traveler, the last thing you want to worry about is whether or not a stranger will gain access to your personal and company information through your credit card or other ...
Read more

How to Protect Your Online Privacy

On a daily basis, the global media reports a huge loss of personnel data, damaged reputations, pilfered intellectual property, or millions of dollars stolen as the result of cyber incidents. An event reported in the news today will likely be eclipsed in scale or audacity in a few months’ time. Neither banks, global corporations, celebrities, ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more