Emerging technologies will affect cybersecurity in the coming years. Artificial intelligence and blockchain will play pivotal roles in data protection, creating new solutions, risks and regulatory headaches.
It’s possible that someone may be watching your screen—by listening to it.
A recent study from cybersecurity analysts at the universities of Michigan, Pennsylvania and Tel Aviv found that LCD screens “leak” a frequency that can be processed by artificial intelligence to provide a hacker insight into what’s on a…
As state actors continue to wage cyberwar on the United States, they have a powerful ally—gaps and ambiguities in the law
Affinity Health Plan failed to consider copy machines as a potential security risk, costing the company over $1.2 million in a civil penalty. The settlement also required the company to expend resources to retrieve the machines, conduct a risk assessment and implement a new security plan.
Jason Tashea
Modern technology has created a honeypot of data for cyberthieves and law enforcement. Police and prosecutors are adopting novel technology and raising new constitutional arguments in court, which brings up privacy concerns.
On March 6, the iPhone’s encryption became no match for the Indiana State Police.
Armed with GrayKey, a tool that circumvents iPhone passwords and encryption, the agency was able to plug into dozens of iPhones in its possession and collect previously unattainable information for ongoing investigations.
Communications technology is “definitely…
Anna Stolley Persky
The cybersecurity needs of a small law firm will be different than the needs of an international firm. However, all law firms must pay close attention to privacy laws.
Equifax. Yahoo. Anthem. Sony.
In the past few years, these companies experienced some of the most significant data breaches to date. And all of these companies found themselves subject to intense worldwide media coverage over their failure to secure their information.
The industries affected—from health care to entertainment—know all too…
Karen Painter Randall and Steven Kroll
Companies are expending more manpower and money on keeping their data safe. The study found that two-thirds of respondents expected their legal department’s role in cybersecurity would increase over the following 12 months, compared with 55 percent in the 2015 survey.
In a profession defined by zealous representation of clients, it’s no surprise that clients are starting to push their outside counsels to beef up cybersecurity.
“The possibility that your outside law firm could be breached and your sensitive data stolen is a huge nightmare for in-house lawyers,” says Sterling Miller,…
As of Jan. 1, 2019, insurers licensed in the state will be required to create and maintain data security standards based on an…
John Bandler
Attorneys are subject to frequent cybercrime attacks, email accounts are breached, and we are solicited to move money for cybercriminals. Helpful frameworks for information security professionals can guide your incident response planning.
Imagine this (not-so-outlandish) scenario: Your law practice has suffered a data breach. Your email accounts, computers or networks have been compromised and your confidential data is no longer confidential. It doesn’t matter how it happened—whether it was a cyberattack, a phishing scam or simply human error. If you are the…
Lawyers at Owens, Schine & Nicola, a personal injury firm in Connecticut, thought they had an easy collections matter to resolve.
In September 2008, the firm received an email from Donna Stepp, an attorney in North Carolina. According to the email, Stepp’s client, Chen Wu, the director of the Shenzhen…
The feature, USB Restricted Mode, is currently the default option in iOS 12 Beta. If the phone has not been unlocked in the previous hour, the feature requires the user to…