Posts

data breach statistics

Top Data Breaches of 2018: Hackers Find New Methods

We periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is largeWe periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is large

facebook and the gdpr

Facebook and the GDPR: Why Your Company Needs To Be Prepared

Data privacy is a big deal right now. Facebook is the latest company facing lawsuits and a PR nightmare related to the way they handled their customer’s data. However, Facebook is not the only company that needs to re-think its privacy related policies. The current data issues that Facebook isData privacy is a big deal right now. Facebook is the latest company facing lawsuits and a PR nightmare related to the way they handled their customer’s data. However, Facebook is not the only company that needs to re-think its privacy related policies. The current data issues that Facebook is

employee data leak

Can Your Business be Liable for an Employee’s Intentional Data Leak?

Many businesses are acutely aware of the dangers of a data leak that can result from the breaching of networks, computer hacks, malware, and computer espionage. These cyber threats are external threats, but businesses must also be increasingly wary of INTERNAL threats coming from vengeful and vindictive employees and ex-employees.Many businesses are acutely aware of the dangers of a data leak that can result from the breaching of networks, computer hacks, malware, and computer espionage. These cyber threats are external threats, but businesses must also be increasingly wary of INTERNAL threats coming from vengeful and vindictive employees and ex-employees.

data security update

7 Reasons to Read FTC’s 2017 Privacy & Data Security Update

The Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breachesThe Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breaches

data security management

10 Data Security Management Tips to Prevent a Data Breach

You may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the smallest company, could brush up on our data securityYou may never suffer a data breach, but that doesn’t mean you shouldn’t know how to prevent one. With the number and severity of data breaches rising every year, it is clear that all of us, from the biggest to the smallest company, could brush up on our data security

avoiding data breaches

Avoiding Data Breaches: Lessons From Regulations

In January of 2017, an amendment to the Federal Acquisitions Regulation (“FAR”) went into effect related to protecting private personal information and requiring privacy training for all federal government contractors. The regulations were issued pursuant to The Privacy Act of 1974. 5 U.S.C. § 552a. The Privacy Act governs federalIn January of 2017, an amendment to the Federal Acquisitions Regulation (“FAR”) went into effect related to protecting private personal information and requiring privacy training for all federal government contractors. The regulations were issued pursuant to The Privacy Act of 1974. 5 U.S.C. § 552a. The Privacy Act governs federal

data protection officer

Yes, Your Business Needs a Data Protection Officer

On May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer dataOn May 28, 2018, new data protections laws and regulations go into effect for the European Union (“EU”). See recent news report here. The new regulations are called the General Data Protection Regulation (“GDPR”). See the full GDPR here. The EU is getting serious about punishing companies that suffer data

SIM Swap Scams Targeting Cryptocurrency Investors

SIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining controlSIM swap scams are nothing new. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts to gain control over a customer’s SIM card. Hackers Gaining Account Control By gaining control

Deceptive Business Practices & The FTC Act

Businesses that engage in deceptive and unfair internet practices are subject to injunctions and large monetary damage awards under the Federal Trade Commission Act (“FTC Act”). Just as importantly, the owners and principals of businesses can be held personally liable. In the case discussed below, FTC v. Ross, the websiteBusinesses that engage in deceptive and unfair internet practices are subject to injunctions and large monetary damage awards under the Federal Trade Commission Act (“FTC Act”). Just as importantly, the owners and principals of businesses can be held personally liable. In the case discussed below, FTC v. Ross, the website

ftc dot com disclosure requirements

The FTC Case against EquiFax Inc.

In early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hackingIn early September of 2017, it was reported that Equifax Inc., one of the country’s three leading credit reporting services, was subject to a cyberattack that resulted in the access by the hackers of financial and personal information of more than 143 million U.S. consumers. According to Equifax, the hacking