Computer Use Policies – Are Your Company’s Illegal According to the NLRB?

The National Labor Relations Board (NLRB) has continued its assault on businesses and their ability to legitimately protect their computer systems and information against unauthorized non-business use by employees. A few weeks ago, I wrote 3 Important Points on Computer Policies in which I stressed (1) why your company must have them but (2) that …

Cyber Law Update on #DtSR Podcast with Los, Santarcangelo and Tuma

Listen to the Podcast   /   Join the #DtSR Discussion on Twitter Shawn Tuma was a guest the Down the Security Rabbithole podcast where he and hosts Rafal Los (@Wh1t3Rabbit) and Michael Santarcangelo (@Catalyst) discussed recent events in the world of cyber law. For more great #DtSR content, check out the full Down the Security Rabbithole podcast …

The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks

What is foreseeable is that cyber attacks often are not. A few years ago the Sony Pictures Entertainment (SPE) hack turned on its head the business world that was already trying to come to grips with the Target, Home Depot, Neiman Marcus, and many other data breaches. There was one thing about the SPE breach …

How a Small Law Firm was Used for an Extensive Cyberattack

TO GET TO THE POINT (click here) INTRODUCTION I recently had the pleasure of reading a guest blog post on Peter Vogel’s Internet, Information Technology & e-Discovery Blog that was authored by John Ansbach. This alone is important because I have a world of respect for Peter and John. If you did not already know …

1 Step to Improve Your Company’s Cybersecurity Today

THE ANSWER: The answer is at the bottom, click here to see it now. Cybersecurity is sounding more and more like the magical mystical snake oil elixir of the new millennium. And, for good reason. Everybody is selling the miracle cure, the one tool that will fix everything, and they are doing so with scare …

Law Firm Cybersecurity: I Hate to Say I Told You So But …

Hey! Any chance you’ve heard anything in the news lately about law firms being under cyber attack? If not, first, crawl out from under that rock; second, take a look at these articles. Wow. Can you believe it? Law firms? Under cyber attack? What is this world coming to? A few years ago, I did a …

Why Cybersecurity Incidents Are Legal Events

In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events. ______________________ Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity …

Apple’s Legal Response in Less Than 300 Words #AppleVsFBI

On February 25, 2016, Apple filed its Motion to Vacate the Court Order requiring it to assist the government. Here is a summary of Apple’s *legal arguments* in its Motion to Vacate in less than 300 words: The government wants Apple to help it circumvent the encryption on a device. Congress has examined the issue and …

The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI

On December 6, 2015, FBI investigators reset the password of Farook’s iCloud account, taking what it believed was the logical next step to gain access to the iCloud backup data. Turns out, that was the wrong move. The phone had not been backed up in nearly 2 months and, had FBI not reset the password, …

Making Sense of #AppleVsFBI Issues: #DtSR Podcast

The USA v. Apple battle is one of the hottest issues currently being debated in cybersecurity, privacy, law enforcement, and perhaps even, water coolers in offices around the country. What the debate is lacking in substantive, factually-based, well-reasoned analysis, it certainly makes up for in passion and strong opinions. If you are not convinced, spend …