Two Step Data Breach Risk Test for Texas Businesses

Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver’s license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare  If you answered …

Why do cyber criminals want your healthcare data?

During a recent presentation a member of the audience asked me why cyber criminals would want to steal a person’s healthcare data. It is easy to understand why they would want to steal payment card data — but healthcare data — not so obvious. Here is a great answer: A crook would love [healthcare data] because, “in the world …

The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation

Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that …

Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???

I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here …

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …

The Legal Side of Data Breach and Third Party Risk (presentation slides)

I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach …

What did Sun Tzu teach about cybersecurity?

Sun Tzu taught that, when it comes to cybersecurity, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday ’13 that resulted in credit card data from roughly 110 million customers being taken? That …

3 Important Questions Your Company Must Answer After A Data Breach

Riddle: What has sensitive data, is the target of cyber criminals, and will (almost certainly) have a data breach? Answer: YOUR COMPANY! When your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach …

The SEC Will Begin Looking at Companies’ IT Security and Data Breach Response Policies

THE POINT: Recent statements from the SEC indicate that the new standard of care for companies may require policies in place for (1) prevention, detection, and response to cyber attacks and data breaches, (2) IT training focused on security, and (3) vendor access to company systems and vendor due diligence. Do you still think your …

Data Security Involves Human Behavior and, Therefore, Is More an Art, Than a Science

I have recently written of how data breach responses and response plans cannot be one-size-fits-all and must be tailored to the unique needs of the company involved, as well as its culture. That is, they must be tailored to fit a company of humans dealing with humans. This morning I read an article that discusses …