The response to an encryption attack can be very difficult. Encrypted critical data usually places a business in a crisis with no ability – or an extremely limited ability – to conduct basic operations. Too few organizations have developed incident response plans providing for contingent or out-of-band communications. Often, before consulting any incident response experts, the victim business has communicated with the attacker and revealed information that the attacker is able to leverage in negotiations.Read more »
- March 14, 2019 ‘Full Moon’ Costs Denied by Supreme Court in Oracle Copyright Case
- March 12, 2019 FLSA Double Time
- February 27, 2019 It’s a Bird, It’s a Plane, No… It’s Cryptojacking!
2fa aba alabama american bar association arkansas audit biometric bipa bitcoin breach notification california ccpa checklist client notification colorado congress consent order consumer notification critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data privacy directive data protection officer data security delaware department of commerce department of financial services employment encryption attack ethereum ethics eu eu-u.s. data privacy shield eu-u.s. privacy shield european parliament european unioin european union fcra federal communication federal trade commission financial firms fines fraud alert gdpr hacking hippa identity theft illinois incidence response plan irs it malware maryland massachusetts microsoft office 365 model law modlishka multi-factor identification naic net neutrality new mexico new york ninth circuit nist security controls nydfs ocabr oregon patching penalties personal data phishing pipeda privacy act ransomeware ransomware rdp regulations remote desktop protocol security posture assessment security vulnerabilities service provider agreement social engineering social media south dakota spear-phishing spokeo statute supervisory authorities supreme court tax preparers tax returns tennessee third party virginia virus workplace policy