top of page

Blog


Cyber Attacks Increasing Exponentially – The Targets, the Tactics, and Potential Defenses
Since January 2020, zscaler claims “an increase of 30,000% in phishing, malicious websites, and malware targeting remote users[.]”...
May 5, 20203 min read


LockBit: The New “It Girl” of Ransomware
In 2019, the following ransomware strains were dominant in the U.S. according to safetydetectives.com: CryptoLocker, WannaCry, and...
May 4, 20203 min read


May 1, 20200 min read


Bank Reaction to Caller ID Spoofing May Attract FTC & SEC Attention
On Tuesday, Krebsonsecurity posted an article describing a new telephone bank scam in which Citibank and a few customers fell victim to...
Apr 30, 20203 min read


5 Ways for Hospitals to Brace for Cyber Impact
Hospitals and healthcare organizations are struggling. Whether plagued by N95 mask shortages or liquidity issues caused by the inability...
Apr 28, 20203 min read


Cybersecurity Maturity Model Certification Compliance – Hurry Up and Wait!
Three months following the initial release of Cybersecurity Maturity Model Certification (CMMC) Version 1.0 from the Office of the Under...
Apr 27, 20203 min read


Cities with Drones Tracking Covid-19 Symptoms - Check the 4th Amendment
In the race to control the spread of Coronavirus and reopen the U.S. economy, many private and public entities seek innovative ways to...
Apr 26, 20203 min read


Report Sextortion Scams under Cybersecurity Information Sharing Act of 2015
For the last two months, @Lacyberlawblog and every other news and government website published articles and alerts about Coronavirus...
Apr 24, 20202 min read


5 Lessons from Fairfax County Public Schools’ Cybersecurity Failures
On April 21, 2020, the head of Fairfax County Public Schools' (FCPS) IT department resigned after repeatedly fumbling the launch of FCPS’...
Apr 24, 20203 min read


U.S. Supreme Court Reviewing "Anti-Hacking" Case - All Employers Should Watch
The United States Supreme Court (USSC) granted cert to review how modern acts are treated under the Computer Fraud and Abuse Act (CFAA),...
Apr 23, 20203 min read


The Great Cost of a Data Breach or Privacy Error
Whether starting a business, continuing existing operations, or taking a pause during Coronavirus restrictions, consider the back-end...
Apr 20, 20201 min read


Navigating the Privacy Law Mess in the U.S.A
2020 & 2021, especially with COVID-19 monitoring, is likely to bring an avalanche of privacy legislation in the U.S. In the absence of...
Apr 19, 20205 min read


QUICK REFERENCE GUIDE - Ransomware & Breaches
Ensure the following parties work together to defend against breaches and develop strategies to respond to and mitigate losses: (1) CISO...
Apr 18, 20201 min read


Hacker lifeblood is social engineering, not better tech.
The tremendous success of COVID-19 cyber scams is the direct result of the predictability of human behavior; specifically, the reptilian...
Apr 17, 20203 min read


STOP USING ZOOM – ENSURE THE INTEGRITY OF YOUR INFORMATION SECURITY
Zoom continues to suffer massive security and privacy breaches, which are well-reported in national news and online. In short, stop using...
Apr 17, 20203 min read


RANSOMWARE: DON’T RUSH TO PAYMENT
According to CrowdStrike’s Global Threat Report 2020 (released March 2020), ransomware remained the most lucrative enterprise for eCrime...
Apr 13, 20202 min read


PCI-DSS COMPLIANCE WITH REMOTE EMPLOYEES
Despite being ultimately responsible for PCI-DSS compliance, most merchants have never heard of it. So, what is PCI-DSS? PCI-DSS stands...
Apr 13, 20203 min read


Apple and Google’s COVID-19 Tracking Tool: Proactive on Privacy
Apple and Google, two tech giants announced their joint effort to use Bluetooth technology and application programming interfaces (APIs)...
Apr 11, 20203 min read


FTC Information for Educators, Parents, and Schools for Online Learning Tools
Yesterday, the Federal Trade Commission (FTC) posted Q&A-style guidance for parents and educators on the Children’s Online Privacy...
Apr 10, 20204 min read


Retain a Cybersecurity Lawyer Before, During, and After the Breach
Whether it’s ransomware, a denial of service attack, a stolen laptop, or an employee stealing information from within, a business facing...
Apr 7, 20203 min read
bottom of page




