
Last time I established some key elements that law firms should keep in mind about cybersecurity for their businesses. Law firms are big targets of cyber-attacks and law firms have…
Last time I established some key elements that law firms should keep in mind about cybersecurity for their businesses. Law firms are big targets of cyber-attacks and law firms have…
Today, we’re continuing with my steps to master cybersecurity in part two of this series. Previously I mentioned steps such as recognizing the threat of cyber attacks, understanding your risks,…
The Attorney Work-Product Doctrine Continuing from the last post on attorney-client privilege (ACP), I’d like to introduce another crucial part of ACP that will protect your company in the future….
This blog post originally published in 2018. Fire, Flood, and Cybersecurity In some respects, cybersecurity is not that different than protecting your building against fire or flood. For instance, if…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…
There are two main strategies I use when I’m in the role of CISO: Make sure people know what’s expected of them. This includes written procedures, training, and periodic reminders…
By mitigate, I assume you mean a company experienced a data breach and now wants to prevent it from happening again. The first step is to make a preliminary mitigation…
In my last post, we discussed how the FTC used its powers in commerce to protect customers from cybersecurity threats. We specifically looked at the case FTC versus Wyndham Worldwide…
In this series of blog posts, I’ll be looking at the Federal Trade Commission (FTC) charges against companies in the area of cybersecurity practices that put consumers at risk. The…
A top concern is, “do I have a false sense of security?” In other words: Are all my controls working properly? Any malfunctions, like a door that doesn’t close all…