Cybersecurity is a team sport and many people within a business must work together to help effectively manage their businesses’ cyber risk. In-house counsel plays a critical role in this process. A recent Law360 article (subscription required) identified the following key things they can do: Develop, implement, and table-top test an incident response plan Advise…
Tag: infosec
Happy Data Privacy Day!
WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future…
Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?
Hear Shawn Tuma interviewed on News Radio 570 KLIF – Experts: Update Settings and Download Updates to Protect from “Meltdown” and “Spectre” CLICK HERE if you are impatient and only want to know what you should do ASAP to protect against Spectre and Meltdown With Y2K we had a warning. So much of a warning that…
The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!
In the last quarter of 2017, I have observed a cybersecurity trend that has given me more hope than any that I have seen previously. Let me explain. As an attorney, I have been practicing what can generally be described as cyber law or cybersecurity law since 1999, which means that my practice has evolved a lot…
Tips for Staying #CyberSecure While Shopping Online for #BlackFriday and #CyberMonday Deals
Cybercriminals need shopping money for the Holidays and one of their favorite times to get yours is when you are shopping on #BlackFriday and #CyberMonday. Use these tips to help stay #cybersecure while shopping online for #BlackFriday and #CyberMonday and at any other time: Credit or debit? Use credit cards, not debit cards, for your online…
Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene
Basic cyber hygiene has been a hot topic in cybersecurity, and for good reason. Most of the incidents that impact companies start with failures of basic cyber hygiene, not the super-sophisticated stuff of the movies. See Start with Cybersecurity Basics: Confirmed by Verizon’s 2016 Data Breach Report. One of the most fundamental rules of cyber hygiene is…
3 Legal Points for InfoSec Teams to Consider Before an Incident
As a teaser to my presentation at SecureWorld – Dallas last week, I did a brief interview with SecureWorld and talked about three of the points I would make in my lunch keynote, The Legal Case for Cybersecurity. If you’re going to SecureWorld – Denver next week, join me for the lunch keynote on Thursday (11/2)…
FUD and Voting Machine Hacking: An Important Point and Important Lesson
This morning I am doing radio interviews as a Fox News Radio contributor. My topic? The DEFCON Voting Village demonstration of hacking voting machines that have been, or may currently be, used in US elections. Here are a couple of the news stories if you are unfamiliar: Hacking a US electronic voting booth takes less than…
OCR Issues Cyberattack Response Checklist and Infographic
The United States Department of Health and Human Services’ Office for Civil Rights has just issued a checklist and infographic to aid healthcare organizations and their vendors in quickly responding to cyberattacks in compliance with HIPAA requirements.
WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7
See also: WIKILEAKS’ VAULT7 CIA HACKING TOOLS RELEASE CONUNDRUM: THE POLITICIZATION OF INTELLIGENCE WIKILEAKS AND CIA’S RUSSIAN HACKING TOOLS & TECHNIQUES: WAS IT REALLY THE RUSSIANS?
You must be logged in to post a comment.