“Hacked” Facebook Account — or Cloned?

Dear friends who keep talking about "hacked Facebook accounts": When there is an account that is pretending to be your account on Facebook (or other social media platforms) that is sending friend requests to others, in most cases, this does not mean that your account has been "hacked" (i.e., inappropriately accessed by someone other than …

5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity

Cybersecurity is a team sport and many people within a business must work together to help effectively manage their businesses' cyber risk. In-house counsel plays a critical role in this process. A recent Law360 article (subscription required) identified the following key things they can do: Develop, implement, and table-top test an incident response plan Advise …

Did hackers record you watching porn? New scam using key elements of phishing and shame hacking

https://youtu.be/BdaXgPawspo Cybercriminals are using yet another new twist on the old email phishing attack: they email people claiming to have infected porn sites with malware that allowed them to take over the recipient's webcam and record them sitting at their computer watching porn and if they don't pay up, the video is going public. I discuss …

Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom

In my latest article in Ethical Boardroom article, I explain some of the not-so-obvious reasons why you need an experienced cyber attorney on your team: Why you need a cyber attorney (Spring 2018) Here are other Ethical Boardroom (@EthicalBoard) articles that I have written or contributed to that are also available for free: Cybersecurity: A Fiduciary Duty …

GDPR, snooping tech, and data privacy — what does this all mean? Shawn Tuma explains

The EU's GDPR, devices and services snooping on our privacy, and data privacy law - what does this all mean? Shawn Tuma explains to CW33's Morning Dose why the EU's General Data Protection Regulation (GDPR) can be a positive step in the long run for simplifying data security and data privacy when compared to the …

Integrating Amazon’s “Rekognition” Tool with Police Body Cameras — Shawn Tuma Discusses on CW33 Morning Dose

There has been an outcry over law enforcement using Amazon's "Rekognition" facial recognition tool and integrating it with their body cameras for nearly real-time identification capabilities. CW33's Morning Dose had cybersecurity and data privacy attorney Shawn Tuma on as a guest to discuss this issue, as seen on this video: https://youtu.be/4g2zsrhimtQ?t=1m23s   Here is another story …

Facebook Suspends 200 Apps for Data Privacy Concerns — What Does This Really Mean?

Facebook suspended 200 apps due to data privacy concerns, which it revealed earlier this week. Shawn Tuma explains some of the key points about this in the following television and radio interviews: CW33 Morning Dose talks to cybersecurity lawyer, Shawn Tuma, about Facebook suspending 200 apps https://youtu.be/KW9iMg7EcOs Facebook suspends 200 apps following Cambridge Analytica revelations, what …

What does it mean to “hack back” and is it a good idea?

There is more and more talk about companies hacking back against those who attack them in cyber space and whether allowing them to take such measures is a good idea. Right now, hacking back, or active defense, as it is often called, is illegal under the federal unauthorized access law, the Computer Fraud and Abuse …

Regulator says May 25 is not doomsday #GDPR

The approach to data protection, and the enforcement of it, should and will be the same 36 days from now as it ever was: Following the rules is the way to go. But if you fail there, yeah, there are going to be some problems. "The aim of our office is to prevent harm, and …

Cyber Risk Management and Attorney-Client Privilege in Cybersecurity Discussed on Business Security Weekly

Business Security Weekly, Episode 81, featured Michael Santarcangelo (@catalyst) inviting Shawn Tuma to join as co-host and guest to discuss two topics that should be near and dear to everyone's hearts: The legal case for why companies need cyber risk management programs and what experienced cybersecurity attorneys' roles are in such programs; and The frequently …