Posts

data breach statistics

Top Data Breaches of 2018: Hackers Find New Methods

We periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is largeWe periodically update this post with recent data breach statistics. Now that we’re into 2018, it’s time to look at the top security breaches in 2018, plus review 2017 and previous years. At Revision Legal, we know that cyber-attacks are a constant threat. The number of data breaches is large

data security update

7 Reasons to Read FTC’s 2017 Privacy & Data Security Update

The Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breachesThe Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breaches

zero-day vulnerability

What is a Zero-Day Vulnerability?

In the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makesIn the realm of cyber security there are many types of attacks and vulnerability exploits that can be used by hackers to gain unauthorized access to computer systems: viruses, Trojans, malware, ransomware, phishing, and a number of different software vulnerabilities. So, what exactly is a zero-day vulnerability and what makes

New Mexico data breach notification

New Mexico Enacts New Data Breach Notification Laws

New Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition toNew Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt to access unencrypted or encrypted computerized data. In addition to

avoid data breach litigation

Tips to Help a Business Avoid Data Breach Litigation

Little else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by data breach lawyers with at least one lawsuit, or evenLittle else is as stressful for a company than handling the aftermath of a data breach. Not only does the company have the obligation of making notifications to clients about the data breach, but it may also be confronted by data breach lawyers with at least one lawsuit, or even

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may beWith growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be

chipped credit card fraud

Are New Chipped Credit Cards Really Safe From Fraud?

Recent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. TheRecent reports have indicated that the new chipped credit cards, i.e., credit and debit payment cards equipped with EMV technology, are not as secure as initially hoped, and show that fraud involving payment cards is still on the rise despite the full deployment of the new, more secure technology. The

hackers gain access

How Do Hackers Gain Access to Computer Systems?

For many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressiveFor many, the concept of system hacking is foggy, and few know how hackers gain access to computer systems. Cyber attacks have been evolving for decades. Once regarded as exploratory curiosity, hackers would access systems without permission only to see if they could. Hacking has converted over time into aggressive

quest diagnostics data breach

Quest Diagnostics Data Breach: Another Healthcare Hack

The Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. AccordingThe Quest Diagnostics data breach is the most recent health care entity to be affected by security hack in 2016. In late November, Quest Diagnostic, a medical laboratory company used by countless health care entities nationwide, announced that it had recently identified itself as a victim of a data breach. According