D CEO Magazine: Why Cybercriminals Are Targeting Law Firms

Many thanks to attorney and legal scholar extraordinaire John G. Browning (@therealjohnbrow) for quoting Shawn Tuma in his article in this month’s D CEO magazine: Why Cybercriminals Are Targeting Law Firms. Continue reading D CEO Magazine: Why Cybercriminals Are Targeting Law Firms

Tuma Discusses Hack of DNC Trump Research (Radio Interviews)

Attackers potentially gained access to customers' personal information (shutterstock)

On Wednesday, June 15, 2016 and Thursday, June 16, 2016, Shawn Tuma was a guest on several radio stations to discuss the hacking attack on the Democratic National Committee in which the hackers obtained the DNC’s opposition research on Donald Trump. Here is the audio from some of the interviews:

Continue reading Tuma Discusses Hack of DNC Trump Research (Radio Interviews)

The CFAA is for Access of a Computer, Not Mere Possession

It often said that the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, is an access crime — meaning that it is designed to punish the wrongful access of a device. A recent case out of the Northern District of Texas highlights this point. Continue reading The CFAA is for Access of a Computer, Not Mere Possession

Tips for Parents to Help Keep Kids Safe Online

 

Missing Kids.png
Alicia Kozakiewicz standing in front of the wall of missing children at the National Center for Missing and Exploited Children headquarters. Read Alicia’s heartbreaking story below.

I was recently asked to talk about online safety tips that parents should understand to help keep their children safe in the online world. Here are some of my talking points: Continue reading Tips for Parents to Help Keep Kids Safe Online

Can a Company Remotely Wipe an Ex-Employee’s Device?

Note: this article was previously posted on Norse’s DarkMatters.

One of my favorite sayings about cyber risk is “an ounce of prevention is cheaper than the very first day of litigation.” A recent case provides a nice example of exactly what I mean. In this case, an effective BYOD policy could have saved this company tens of thousands of dollars, at least. Continue reading Can a Company Remotely Wipe an Ex-Employee’s Device?