Responsiveness and Responsibility Are Considered in Assessing Data Breach Fines

About a year and a half ago I wrote a post titled Data Breach – Who’s Gonna Get it? where I made the point that, much like with Ford’s “bean counting” with the Pinto deaths back in the ’70s, companies that were aware of the risk of data breach but did not act responsibly were …

Have you ever tried to physically destroy a hard drive?

I have. It is not easy. You would not believe how hard it was to do just this much damage to them.

This Is Why Your Business Needs Cyber Insurance Coverage

Unless your business is selling home-grown vegetables out of a truck on the side of the road, you need to seriously consider getting insurance that covers cyber risks. Why? Because most insurance companies will not willingly cover cyber-related losses under their conventional insurance policies. Trust me, I have fought this battle before! A recent case …

Is Your Mobile Device Secure? Find Out With the FCC’s New Tool

Data security is a hot issue right now. Given the increasing popularity and prevalence of mobile devices combined with their ability to easily store and access so much of our sensitive data, mobile device security is even hotter. The Federal Communications Commission (FCC) also recognizes the importance of this issue and now offers a free tool …

Texas’ Amended Data Breach Notification Law

Texas amended its existing data breach notification law which became effective on September 1, 2012. The relevant section of the law is titled “Notification Required Following Breach of Security of Computerized Data” and is found at Section 521.053 of the Texas Business and Commerce Code. The main body of the law provides as follows: (b)  A …

Want to be Creeped Out or Creeped On? “Girls Around Me” Shows Dangers of Sharing TMI on Social Media

You may or may not be creeped out by this new app but, it’s a good bet that if you haven’t already been creeped on, you will be. All from your own information! A new app called Girls Around Me is a creeper’s dream. The scariest part about it is that it is powered by …

Mind Control, Human Hacking & the Computer Fraud and Abuse Act?

Here is a thought to ponder: Would it violate the Computer Fraud and Abuse Act to hack a person? Based on the broad definition of computer that is used in the Computer Fraud and Abuse Act I believe that the answer could be “yes.” Here is why: The CFAA applies to anything with a microchip …

Cybersecurity risk — think its material? (hint: the SEC does!)

That’s right — the Securities and Exchange Commission has determined that risks associated with cybersecurity can be material enough to require that they be included in companies’ disclosures. The SEC issued a disclosure guidance on October 13, 2011 to alert companies that these risks may fall within their existing disclosure requirements. In other words, what …

We Are The Biggest Security Risk To Our Companies

“We are the weakest link.” Wow, this is certainly the theme of the last few weeks — people are realizing that the biggest threat to companies’ security defenses are the people people inside the companies. You may recall that I discussed this issue in two blogs about this over the last couple of weeks: Guarding …

Data Risk Help For Small Businesses That Need It Most

Small businesses, more than any other identifiable group, need someone to help guide them through assessing their data risks, securing their companies’ data, taking the necessary measures to protect against those risks, and coordinating a proper response in the event of a breach. This is the message that can be taken from a blog by …