Video: What to do if you have a Yahoo account (Tuma on WFMJ News)

Video interview: Shawn Tuma discusses what to do if you believe your Yahoo account has been compromised – WFMJ NBC News, Youngstown-Warren, Ohio Full news article: What to do if you believe your Yahoo account has been compromise – WFMJ.com News weather sports for Youngstown-Warren Ohio ______________________ Shawn Tuma (@shawnetuma) is a business lawyer with …

You Could See This One Coming: Vibrator Company Sued for Tracking Usage

SETTLEMENT UPDATE: A Canadian sex-toy manufacturer, We-Vibe, has been ordered to pay out almost $3 million to customers who bought a “smart vibrator” that tracked owners’ usage without their knowledge. Each customer who used the associated app will be paid $7,433, and customers who bought the vibrator but never used the app can claim up to …

Cybersecurity Legal Issues: What you really need to know (slides)

Shawn Tuma delivered the presentation Cybersecurity Legal Issues: What you really need to know at a Cybersecurity Summit sponsored by the Tarleton State University School of Criminology, Criminal Justice, and Strategic Studies’ Institute for Homeland Security, Cybercrime and International Criminal Justice. The presentation was on September 13, 2016 at the George Bush Institue. The following are the slides …

Cybersecurity Incident Response Checklist

Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. Take a look at the following checklist (note, this is not an incident response plan!) while keeping in mind that over half of the items on that checklist …

Brazzers porn hack: more than just account holders exposed–what does this mean for your company?

We have been observing an evolution in hackers’ tactics from going after data that could be directly monetized, such as payment card data, to going after data that can be monetized indirectly through extortion, such as the Ashley Madison data. The hack of Brazzers porn site is similar to the Ashley Madison hack in that the …

Cybersecurity: How Long Should An Incident Response Plan Be?

Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared — just the way I like it. During our discussion, the subject of Incident Response Plans came up and I explained why …

Three Takeaways from the Target Data Breach Ruling

Note: this article was previously posted on Norse’s DarkMatters. In December 2014, the Court in the Target data breach lawsuits issued a ruling that will impact the future course of data breach litigation (the Order). In the Order, the Court identified multiple distinct data security duties that Target, as well as other companies, owe their …

The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks

What is foreseeable is that cyber attacks often are not. A few years ago the Sony Pictures Entertainment (SPE) hack turned on its head the business world that was already trying to come to grips with the Target, Home Depot, Neiman Marcus, and many other data breaches. There was one thing about the SPE breach …

How a Small Law Firm was Used for an Extensive Cyberattack

TO GET TO THE POINT (click here) INTRODUCTION I recently had the pleasure of reading a guest blog post on Peter Vogel’s Internet, Information Technology & e-Discovery Blog that was authored by John Ansbach. This alone is important because I have a world of respect for Peter and John. If you did not already know …

1 Step to Improve Your Company’s Cybersecurity Today

THE ANSWER: The answer is at the bottom, click here to see it now. Cybersecurity is sounding more and more like the magical mystical snake oil elixir of the new millennium. And, for good reason. Everybody is selling the miracle cure, the one tool that will fix everything, and they are doing so with scare …