3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach

In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach to protect the data and keep it from happening? What steps is …

What is Corporate Espionage, Industrial Espionage, Cyber Espionage, and Economic Espionage? The DOJ Explains …

What is Cyber Espionage? Corporate espionage, industrial espionage, and cyber espionage all generally mean the same thing: (1) intentionally targeting or acquiring trade secrets of companies to benefit any foreign government, foreign instrumentality, or foreign agent, (FBI) which means, in simpler terms, (2) espionage conducted to gain a commercial advantage (Wikipedia). What is this not? This …

Here is a “Computer Fraud” Case that is NOT Covered by the Computer Fraud and Abuse Act!

Believe it or not, there really can be a case of “computer fraud” that is NOT covered by the Computer Fraud and Abuse Act (CFAA). Surprised? Let me explain. The CFAA is an “access” crime that requires there to be an unlawful “access” to a computer by either accessing a computer “without authorization” or “exceed[ing] authorized access.” …

Using Social Media in Your Law Practice – Presentation to Collin County Bar Association #ccba

Today I have the pleasure of speaking to a great group of Collin County lawyers in the Collin County Bar Association’s monthly general meeting about the practical and ethical considerations of using social media in a law practice as well as my own tips that I have learned by using social media in my practice. Here is are Prezi …

Two Step Data Breach Risk Test for Texas Businesses

Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver’s license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare  If you answered …

Why do cyber criminals want your healthcare data?

During a recent presentation a member of the audience asked me why cyber criminals would want to steal a person’s healthcare data. It is easy to understand why they would want to steal payment card data — but healthcare data — not so obvious. Here is a great answer: A crook would love [healthcare data] because, “in the world …

The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation

Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that …

Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF

This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take …