Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA’s computer network and copied 400 of MHA’s proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham’s actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., “hacking …
Monthly Archives: June 2017
#cybersecurity is not an just an IT issue, it is a business risk issue
Cybersecurity is not an IT issue, it is a business risk issue. It must be managed as such.
#CyberAvengers: 9 Ways to Declare Independence from Hacking
Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]
Kevin OKeefe and Shawn Tuma’s Conversation About Lawyers and Blogging at #SBOT17
While at the 2017 State Bar of Texas Annual Meeting, I had the pleasure of visiting with Kevin OKeefe of LexBlog in a Facebook Live conversation where we talked about lawyers, blogging, and the evolution of my cybersecurity and data privacy practice. Check out the video and let us know what you think: https://www.facebook.com/kokeefe/videos/10154705674546696/ Here’s …
Continue reading “Kevin OKeefe and Shawn Tuma’s Conversation About Lawyers and Blogging at #SBOT17”
#CyberAvengers: Ransomware Spreading Like Crazy Worms
Read the #CyberAvengers’ recent article, Ransomware Spreading Like Crazy Worms, on NextGov.com, Levick.com, or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking […]
#CyberAvengers: Fixing the Federal IT Mess Before it is Too Late
Read the recent #CyberAvengers article, Fixing the Federal IT Mess Before it is Too Late, on Levick.com or The #CyberAvengers website. _____________________________ The #CyberAvengers (Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, Christophe Veltsos) are a group of salty and experienced professionals who have decided to work together to help our country by defeating cybercrime and slowing down nefarious actors operating in cyberspace seeking to …
Continue reading “#CyberAvengers: Fixing the Federal IT Mess Before it is Too Late”
New Hacking Technique Revealed, Viruses in Online Video Subtitles
Check Point security group has released information revealing how hackers are now using online video subtitles as a source to transport viruses into personal computers, granting hackers to endless information for very little work. This method of hacking requires a user to do nothing other than opening up their favorite videos online. According to a …
Continue reading “New Hacking Technique Revealed, Viruses in Online Video Subtitles”
OCR Issues Cyberattack Response Checklist and Infographic
The United States Department of Health and Human Services’ Office for Civil Rights has just issued a checklist and infographic to aid healthcare organizations and their vendors in quickly responding to cyberattacks in compliance with HIPAA requirements.

You must be logged in to post a comment.