Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law

Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA’s computer network and copied 400 of MHA’s proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham’s actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., “hacking …

#cybersecurity is not an just an IT issue, it is a business risk issue

Cybersecurity is not an IT issue, it is a business risk issue. It must be managed as such.

#CyberAvengers: 9 Ways to Declare Independence from Hacking

Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]

Kevin OKeefe and Shawn Tuma’s Conversation About Lawyers and Blogging at #SBOT17

While at the 2017 State Bar of Texas Annual Meeting, I had the pleasure of visiting with Kevin OKeefe of LexBlog in a Facebook Live conversation where we talked about lawyers, blogging, and the evolution of my cybersecurity and data privacy practice. Check out the video and let us know what you think: https://www.facebook.com/kokeefe/videos/10154705674546696/ Here’s …

#CyberAvengers: Ransomware Spreading Like Crazy Worms

Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]

#CyberAvengers: Fixing the Federal IT Mess Before it is Too Late

Read the recent #CyberAvengers article, Fixing the Federal IT Mess Before it is Too Late, on Levick.com or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking to …

New Hacking Technique Revealed, Viruses in Online Video Subtitles

Check Point security group has released information revealing how hackers are now using online video subtitles as a source to transport viruses into personal computers, granting hackers to endless information for very little work. This method of hacking requires a user to do nothing other than opening up their favorite videos online. According to a …

OCR Issues Cyberattack Response Checklist and Infographic

The United States Department of Health and Human Services’ Office for Civil Rights has just issued a checklist and infographic to aid healthcare organizations and their vendors in quickly responding to cyberattacks in compliance with HIPAA requirements.