The response to an encryption attack can be very difficult. Encrypted critical data usually places a business in a crisis with no ability – or an extremely limited ability – to conduct basic operations. Too few organizations have developed incident response plans providing for contingent or out-of-band communications. Often, before consulting any incident response experts, the victim business has communicated with the attacker and revealed information that the attacker is able to leverage in negotiations.Read more »
- November 05, 2019 Equal Pay and Barbie Dolls
- October 18, 2019 Four Employment Policy Pitfalls for Multi-Jurisdiction Businesses to Avoid
- October 17, 2019 I Can’t Get Sued for Posting a Picture of Myself on Social Media… Can I?
- September 23, 2019 Protecting Your Trade Secrets in the European Union
- September 09, 2019 Ransomware Attack Trends: Tips for Prevention & Response
2fa alabama american bar association arkansas audit biometric data bipa breach notification california canada ccpa client notification colorado congress consent order consumer consent consumer notification credit card fraud credit report critical security controls cryptocurrency cryptojacking cybersecurity cyber threat data breach data privacy data privacy act data security department of financial services digital forensics dmarc electronic information electronic protected health information employment equifax eu eu-u.s. privacy shield european parliament european unioin european union fbi fcra federal trade commission fines forensics fraud fraud alert gdpr hacking hhsocr hippa human resources identity theft illinois incident response internet service provider irs it it professionals legislative alert malware managed service providers manufacturing maryland meltdown michigan microsoft office 365 model law modlishka money service business multi-factor identification naic new jersey new mexico new york ninth circuit nist framework nist security controls oregon passwords personal data personal information phishing pipeda ransomware regulations security rule social engineering social media south dakota spectre statute supervisory authorities supreme court tax preparers tax returns utah virginia washington workplace policy