toggle accessibility mode
data breach statistics

Top Data Breaches of 2020: Ransomware on The Rise

We periodically update this post with recent data breach statistics. Now that we’re into 2021, it’s time to look at the top security breaches, hacking statistics, and cybersecurity statistics of 2020, 2019, 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches… READ MORE

data privacy news

2018’s Biggest Data Privacy News Stories

2018’s Biggest Data Privacy News Stories As the year draws to a close, we wanted to take a moment to review the biggest data privacy news stories of 2018 and discuss what we can learn from them as we move into the new year. 1.   Europe’s GDPR Probably the biggest news story is the European… READ MORE

manage data breaches

How to Manage Data Breaches Under GDPR

How to Manage Data Breaches Under GDPR In recent weeks, we have posted about the requirements of personal data protection under Europe’s General Data Protection Regulation (GDPR) that companies must now follow. Today we will look into what a company must do in the event of a data breach under this regulation. Over the past… READ MORE

data security update

7 Reasons to Read FTC’s 2017 Privacy & Data Security Update

The Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breaches seriously: 1. The Number of… READ MORE

zero-day vulnerability

What is a Zero-Day Vulnerability?

In the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makes this type of vulnerability so… READ MORE

New Mexico data breach notification

New Mexico Enacts New Data Breach Notification Laws

New Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition to providing governance on how personal… READ MORE

avoid data breach litigation

Tips to Help a Business Avoid Data Breach Litigation

Little else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by data breach lawyers with at least one lawsuit, or even a class action. There are… READ MORE

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be to blame. Perhaps an employee… READ MORE

chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The new chipped credit cards were… READ MORE

hackers gain access

How Do Hackers Gain Access to Computer Systems?

For many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressive intrusions into computer systems for… READ MORE

Make better decisions for your business, and avoid the online legal traps.

LET'S DISCUSS YOUR CASE