chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The new chipped credit cards were… READ MORE

active cyber attacks

Active vs Passive Cyber Attacks Explained

Cyber attacks involve the unauthorized access of private or confidential information contained on computer systems or networks, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyber attack, a passive type attack, or some combination of the two. According to Symantec, both active and passive cyber attack types… READ MORE

Medjacking is a Real Threat to Health Care Systems

Medjacking, or medical device hijacking, is a new kind of cybersecurity threat to health care systems. Medjacking involves hacking into medical devices using backdoors to access software on the device. Since many of the vulnerable medical devices, such as life-support equipment and diagnostic equipment, use older or standard operating systems, the biggest challenge for a… READ MORE

Cybercrime Now a Bigger Worry Than Physical Crime

Cybercrime and data breaches have been on the rise for many years, and it is not surprising that the threat of cybercrime has become a bigger concern for people than the threat of real, physical criminal acts. A recent report issued by Sophos, Ltd. indicates that people are now more worried about being the victim… READ MORE

Montana Data Breach Notification Law

Montana Data Breach Notification Law has been updated to expand the definition of “personal information” and also require notice to the state attorney general’s consumer protection office. A data breach is generally a security incident in which sensitive, protected, or confidential data is copied, transmitted, stolen, viewed, or used by an individual unauthorized to do… READ MORE

Make better decisions for your business, and avoid the online legal traps.

LET'S DISCUSS YOUR CASE