Data Breach

The High Cost of Data Breaches: Six Examples From 2017

Whether you are a small startup or a big company with a long and storied history, a data breach can be a legal and financial nightmare. There were over 850 cyberattacks and data breaches in 2017 alone, with the number and severity of data breaches rising every year. The costWhether you are a small startup or a big company with a long and storied history, a data breach can be a legal and financial nightmare. There were over 850 cyberattacks and data breaches in 2017 alone, with the number and severity of data breaches rising every year. The cost

hacking statistics

2017 Security Breaches: Frequency and Severity on the Rise

We periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look back at the largest data breaches of 2017. We here at Revision Legal know that cyber-attacks are a constant threat. The number of data breaches is large and the amount ofWe periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look back at the largest data breaches of 2017. We here at Revision Legal know that cyber-attacks are a constant threat. The number of data breaches is large and the amount of

employee data leak

Can Your Business be Liable for an Employee’s Intentional Data Leak?

Many businesses are acutely aware of the dangers of a data leak that can result from the breaching of networks, computer hacks, malware, and computer espionage. These cyber threats are external threats, but businesses must also be increasingly wary of INTERNAL threats coming from vengeful and vindictive employees and ex-employees.Many businesses are acutely aware of the dangers of a data leak that can result from the breaching of networks, computer hacks, malware, and computer espionage. These cyber threats are external threats, but businesses must also be increasingly wary of INTERNAL threats coming from vengeful and vindictive employees and ex-employees.

data security update

7 Reasons to Read FTC’s 2017 Privacy & Data Security Update

The Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breachesThe Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breaches

data breach attack

10 Common Data Breach Attack Techniques

Among the more frustrating aspects of cyber security is the constantly evolving nature of the threat and the multitude of data breach attack techniques. One vulnerability is patched only for another to be found/created; one technique is foiled only for a different tactic to arise. Here we give a briefAmong the more frustrating aspects of cyber security is the constantly evolving nature of the threat and the multitude of data breach attack techniques. One vulnerability is patched only for another to be found/created; one technique is foiled only for a different tactic to arise. Here we give a brief

data security management

10 Data Security Management Tips to Prevent a Data Breach

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the smallest company, could brush up on our data securityYou may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the smallest company, could brush up on our data security

avoiding data breaches

Avoiding Data Breaches: Lessons From Regulations

In January of 2017, an amendment to the Federal Acquisitions Regulation (“FAR”) went into effect related to protecting private personal information and requiring privacy training for all federal government contractors. The regulations were issued pursuant to The Privacy Act of 1974. 5 U.S.C. § 552a. The Privacy Act governs federalIn January of 2017, an amendment to the Federal Acquisitions Regulation (“FAR”) went into effect related to protecting private personal information and requiring privacy training for all federal government contractors. The regulations were issued pursuant to The Privacy Act of 1974. 5 U.S.C. § 552a. The Privacy Act governs federal

data protection officer

Yes, Your Business Needs a Data Protection Officer

On May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer dataOn May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer data

SIM Swap Scams Targeting Cryptocurrency Investors

SIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining controlSIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining control

ftc dot com disclosure requirements

The FTC Case against EquiFax Inc.

In early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hackingIn early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hacking