By: Drew Sorrell Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and procedures, endpoint detection and …
Data Breaches & Ransomware [Lowndes Legal Talk]
Tune in to Lowndes Legal Talk featuring attorneys Drew Sorrell and Mark Heimendinger discussing the significant consequences associated with data breaches and ransomware, as well as ways to minimize the risk of becoming a …
Zoom Demonstrates that Security Is Not IT’s Problem
By: Drew Sorrell Amidst the coronavirus pandemic, remote meetings have become “the new normal,” with Zoom, seemingly overnight, becoming the platform of choice. Zoom’s success is attributable to the fact …
Are E-Discovery, Cybersecurity, Two Sides of the Same Coin? BIA Says Yes
By: Frank Ready Law.com BIA, an e-discovery and digital forensics software and services provider, has announced it has launched a new data breach discovery service applying e-discovery technology and practices …
7 Things You Can Do Now in Light of the Starwood/Marriott Breach
By: Drew Sorrell Today Marriott International announced a massive data breach of its Starwood database. Hackers took off with names, mailing addresses, phone numbers, email addresses, passport numbers, affinity account …
A Breach in the Boardroom?
By: Ben Butterfield The threat of cybersecurity breaches has evolved from a matter of “if” to “when”. With shareholder activists and regulators calling for greater transparency in cybersecurity risk management, …
The 30 Minute Breach Drill
By Ben Butterfield A General Counsel should plan on preparing an initial briefing to a CEO shortly after a data breach has occurred. Advance planning will help you achieve this …