The response to an encryption attack can be very difficult. Encrypted critical data usually places a business in a crisis with no ability – or an extremely limited ability – to conduct basic operations. Too few organizations have developed incident response plans providing for contingent or out-of-band communications. Often, before consulting any incident response experts, the victim business has communicated with the attacker and revealed information that the attacker is able to leverage in negotiations.Read more »
Ransomware: Recommendations for Preparation and Response Posted on: January 03, 2019 In: Data Privacy & Cybersecurity
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
9th circuit affordable care act agreements alabama america invents act arkansas audit breach notification business california ccpa client notification cobra colorado compensation compliance congress consumer notification copyright cryptocurrency cybersecurity cyber threat data breach data privacy data security digital music discrimination employers employment employment agreements employment law equifax eu eu-u.s. privacy shield european union fbi fcra federal circuit federal trade commission firing first amendment first sale doctrine flsa free speech gdpr hacking health insurance hippa hiring human resources identity theft illinois infringement inter partes review irs labor and employment lay off legislative alert malware managed service providers maryland medical leave medical loss ratio microsoft office 365 minimum wage multi-factor identification net neutrality new jersey new mexico new york nist security controls non-competition non-disclosure non-solicitation overtime patent litigation patents payroll personal data phishing premium rebate ptab ransomware redigi reduction in force regulations social engineering social media statute supreme court tax returns technology tennessee termination trade secrets utah venue virginia wages washington