Cyber Security ( Page 2 )

  • Home
  • Posts Tagged "Cyber Security"
  •  ( Page 2 )

U.S. Companies Still Grappling With GDPR

Several months after the European Union’s (EU’s) new sweeping privacy law known as the General Data Protection Regulation (GDPR) went into effect on May 25, 2018, U.S. companies are still struggling to understand the implications for their businesses. This article highlights some of the key threshold issues that companies should consider in analyzing the potential ...
Read more

The Unique Challenges of Data Security in the Hospitality Industry

The hospitality industry has been in the news frequently over the past year as a result of multiple and significant data security incidents. Nationally recognized hotel and resort brands continue to suffer by cyber-attacks, including theft of payment card data from their retail and food/beverage outlets, and at times theft of guest data from reservations ...
Read more

Russian Hackers and Spanish Spyware Apps: The latest in FIFA 2018 Cybersecurity News

June 13: FIFA fans beware: If you attend the World Cup, and plan to take any form of computer or device with you, you are likely to be hacked. In fact, 72% of cybersecurity professionals anticipate an attack during the World Cup, which takes place in Russia over the next month. William Evanina, Director of ...
Read more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this year. Indeed, the majority of all U.S. businesses have experienced at least one cybersecurity incident in the last year, with some ...
Read more

6 Ways to Protect Yourself Against a Data Breach

The threat of credit card data breaches and hacks throughout companies is unfortunately becoming more common as the world expands globally and technologically. As a traveler, the last thing you want to worry about is whether or not a stranger will gain access to your personal and company information through your credit card or other ...
Read more

How to Protect Your Online Privacy

On a daily basis, the global media reports a huge loss of personnel data, damaged reputations, pilfered intellectual property, or millions of dollars stolen as the result of cyber incidents. An event reported in the news today will likely be eclipsed in scale or audacity in a few months’ time. Neither banks, global corporations, celebrities, ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

Cyber Insurance: Get What You Pay For

Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential data breaches.  The result is that more and more companies are considering and purchasing cyber insurance.  Companies are increasingly recognizing that customer names, customer financial data, credit ...
Read more

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand the risks and be prepared. To help, the National Institute of Standards and Technology (NIST) ...
Read more

President Trump Sets New Standards for Cybersecurity

President Trump has issued a much-anticipated executive order (EO) on cybersecurity. The order requires all federal executive agencies to adhere to a single security framework and is intended to improve the nation’s defenses against pervasive cyberattacks. In light of this order, clients may ask more pointed questions about the security policies and procedures that a ...
Read more