Features
Ransomware in Review: 8 Prevention and Response Tips for Your Organization
Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.
Features
<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration
Legal and compliance groups have a lot to gain from features within Office 365, and equal or greater risk if the process is not conducted in the context of strong legal and regulatory guidelines.
Features
<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm
The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.
Features
<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm
The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.
Features
<b><i>BREAKING NEWS</b></i><br>Anthem Agrees to Record $115M Data Breach Settlement
Anthem Inc. has agreed to pay $115 million to settle claims related to the massive 2015 cyberattack that affected 78.8 million customers. If approved by U.S. District Judge Lucy Koh of the Northern District of California, the deal would be the largest data breach settlement in history.
Features
Layered Federal and State Cybersecurity Regulation of Financial Services Firms
Cybercrime poses an ever-increasing threat to consumers of financial products and services. In 2016, the then- SEC Chair said that cybercrime ranks as “one of the greatest risks facing the financial services industry.” Federal law thus requires financial services firms to implement procedures designed to protect their customers' data. Now individual states are increasingly getting into the game.
Features
New Research: Employee Privacy and Corporate Legal Risk
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features
Will Ransomware Attack Make Law Firms 'WannaCry'?
Employees the world over were locked out of their computers on May 12 and over that following weekend as an insidious and widespread cyberattack nicknamed "WannaCry" rolled through the Internet and into headlines. Luckily for U.S. law firms, experts said it was unlikely that this particular ransomware attack hit many of them. However, they fear aftershocks.
Features
State of the Industry: E-Discovery and Cybersecurity
<b><i>The Future State of the E-Discovery Job Market Will Be Cloud and Contract Staffing</b></i><p><b><i>Part Three of a Three-Part Article</b></i><p>If the history of e-discovery is the future of cybersecurity, then what should one expect for the future of e-discovery? How long will the current period of consolidation continue? What will be the next chapter in e-discovery's never-ending reinvention? How closely will the next 10 years of cybersecurity job trends mirror e-discovery's past?
Features
Ransomware: The Good, the Bad and the Ugly
Ransomware has quickly emerged as a billion dollar industry and shows no sign of slowing down. So why is ransomware the ubiquitous nuisance it is? Simple: It works. Over 70% of companies pay the ransom.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›