pie

Low Hanging Fruit Can Make a Pretty Good Cybersecurity Pie

“Cybersecurity” just sounds like something that must be really complicated, right?

Sure it does — it sounds exotic and cool — and complicated. And yes, when you get into the weeds of technical things that hackers (actually, crackers) do to monkey around with computers, it can be mind-boggling.

But, must you really understand all of those things to have some basic cybersecurity protection to help improve the odds for your company?

phishingThink about this:

  • How much would your company’s cybersecurity odds improve if nobody in your company ever clicked on a phishing email?
  • If 75% wouldn’t?
  • If 50% more wouldn’t, after being taught how to think about them, than would have before?
  • How hard would it really be to take one day a month and have a lunch-and-learn for your workforce to help teach them how to think about and recognize such attacks, as well as other similar techniques the bad guys use?

piePhishing scams, weak passwords, infected usb devices — those aren’t the exotic things that people think about when they hear the word “cybersecurity.” They are the easy(ier) things — the low hanging fruit in the grand cybersecurity scheme. But don’t forget, even that low-hanging fruit can go a long way toward making a really good cybersecurity pie and save you and your company a whole lot of heartburn!

 

#LMAMKT

Post Webinar Thoughts: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice

Here is a great post by Cordell on a few takeaways from our webinar on social media marketing for lawyers. Check it out and let us know what you think: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice | Cordell Parvin Blog.

Chaos? Plan Ahead!

New Podcast: #DtSR Episode 130 – Where Law and Cyber Collide

I really appreciate the #DtSR Gang [Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst)] inviting me to tag along for another episode of the Down the Security Rabbit Hole podcast.

In this episode we discuss the following:

  • Traveler’s Insurance files suit against a web development company for failing to provide adequate security, resulting in a breach of one of its customers
  • FTC goes after LabMD for a data breach
  • Social media company TopFace pays a ransom to hackers

Go HERE for more details and to listen to the Podcast!

#LMAMKT

Upcoming Webinar: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice

#LMAMKTOn Tuesday, February 17, 2015, my coach Cordell Parvin (@CordellParvin) and I will be presenting this webinar for the Legal Marketing Association (LMA): Simple Ways to Effectively Use Social Media to Help Build Your Law Practice: Sponsored by the Social Media SIG

This webinar is based on the information we shared in the 3 part series of blog posts that were on Cordell’s blog: Simple Ways to Use Social Media to Build Your Practice in One Hour

Attendees will be live-tweeting at #LMAMKT and you will be able to view the Prezi HERE

This should be a lot of fun so you don’t want to miss it! For more information on the webinar, go HERE

#LMAMKT

 

Texas Business Guide for Identifying and Protecting Trade Secrets - Cover

Get Your Free Texas Business Guide: Identifying and Protecting Trade Secrets Under the (New) Uniform Trade Secrets Act

Trade secrets are the lifeblood of a company but it can be a difficult issue to understand.

Here is a free guide to help you identify and protect your company’s trade secrets.

DOWNLOAD: Texas Business Guide for Identifying and Protecting Trade Secrets

Yes, Your Business Has Trade Secrets

Texas Business Guide for Identifying and Protecting Trade Secrets - CoverWhether they realize it or not, virtually every business has trade secrets which can be as simple as something unique or remarkable about the way it makes a product or provides a service that sets it apart from the competition. This is something that gives the business a competitive advantage and is usually something it has spent significant time and resources to develop.

Unfortunately, in today’s business environment, honor and integrity are not always the rule and many businesses find their trade secrets are being taken and used to compete against them. This can come from as close as disloyal employees or local competitors to around the world from foreign state‐sponsored organizations engaging in industrial espionage.

Preparation is the Key to Successfully Protecting Your Businesses’ Trade Secrets

The first-time many businesses ever gives serious thought to their trade secrets is when they find that they have been taken. It is then that the business begins scrambling to identify its trade secrets and, assuming it can put together a comprehensive list, hopes and prays that it has satisfied the requirements for keeping that information protected under the law of trade secrets so that it can use the legal process to keep it from being used by the businesses’ competitors. To make matters worse, when the disclosure of trade secrets is being threatened and an injunction from a court is all that will stop it, Time is precious and every minutes can make the difference between winning or losing.

Here Is The Guide

Shawn Tuma has prepared a comprehensive Guide to help you understand how to identify and protect your businesses’ trade secrets. The Guide provides a step-by-step explanation of everything from what trade secrets are in general, to how to identify your own businesses’ trade secrets, to the most common threats against trade secrets, and how to protect against those threats.

You can download a free .pdf copy of the Guide by clicking on this link: Texas Business Guide for Identifying and Protecting Trade Secrets 

Once you have downloaded the Guide, you can be proactive in protecting your businesses’ trade secrets by using it to prepare for the problem before it ever arises and, in doing so, help reduce the chances that the problem will ever arise by:

  1. carefully evaluating what information it has that qualifies as trade secret information;
  2. implementing security measures, policies, and procedures to prevent the disclosure of that information and protect its trade secret status; and,
  3. in the event its trade secrets are ever compromised, be much better prepared to quickly and efficiently make its case in a court of law and successfully prevent others from using its trade secrets.
About the author

Shawn Tuma is a lawyer who is experienced in advising clients on complex intellectual property issues such as trade secrets litigation and misappropriation of trade secrets (under common law and the Texas Uniform Trade Secrets Act), unfair competition, and cyber crimes such as the Computer Fraud and Abuse Act. He is a partner at Scheef & Stone, L.L.P., a business law firm with offices in Dallas and Frisco, Texas which is located minutes from the District Courts of Collin County, Texas and the Plano Court of the United States District Court, Eastern District of Texas. He represents clients in lawsuits across the Dallas / Fort Worth Metroplex including state and federal courts in Collin County, Denton County, Dallas County, and Tarrant County, which are all courts in which he regularly handles cases (as well as across the nation pro hac vice ). Tuma regularly serves as a consultant to other lawyers on issues within his area of expertise and also serves as local counsel for attorneys with cases in the District Courts of Collin County, Texas, the United States District Court, Eastern District of Texas, and the United States District Court, Northern District of Texas.

No Fear!

No Standing for Fear of Future Harm: Another Consumer Data Breach Class Action Dismissed

No Fear!The U.S. District Court for the Southern District of Texas dismissed a class action data breach lawsuit filed by Beverly T. Peters against St. Joseph Services Corp. The reason is familiar in consumer class action data breach cases: fear from the heightened risk of future identity theft or fraud from a data breach does not give legal standing to sue by a party whose data may have been compromised.

“Having reviewed the parties’ submissions and the relevant law, the court concludes that the answer is no,” the judge wrote in the opinion. “Peters has not made the requisite demonstration of injury, traceability and redressability for her alleged injuries. Lacking viability, her federal claims are dismissed with prejudice.”

The original Law360 article is here, but it is behind a paywall so you will need a subscription to access: Another data breach case dismissed for no standing: Ex-Patient’s Class Action v. St Josephs.

shutterstock_59508448

Executives & Board: The conversation security leaders need to have about Amy Pascal’s departure

This is an excellent article that covers a very important topic you need to consider. You — as in Executives and Board Members of Companies all around the world.

Stop, close your eyes, and ask yourself these three questions that are in this article:

  1. “What did you think of the announcement?” (i.e., put yourself in her position and envision that day)
  2. “Is there anything in your emails and files that, if exposed, would get you fired?” (this is self explanatory, but see this related post for advice on this issue: #SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?)
  3. “In the event we experience a breach, what are our priorities?” (again, self explanatory, but see this related post for advice on planning: Breach Response Planning)

Now check out the full article: The conversation security leaders need to have about Amy Pascal’s departure | CSO Online.