Recent Posts
Jun 29, 2017
European Union Proposes Banning Encryption Back Doors
Engadget reported on June 19th that while the European Union might want it to be easier for police to obtain
Read MoreJun 28, 2017
Craig Ball: Cybersecurity is a Pain Point for Plaintiffs
In a recent blog post by my friend Craig Ball, he notes that litigators have proven obstinate when it comes
Read MoreJun 27, 2017
Infection by Mouseover: PowerPoint Spam
Malware-laced PowerPoint files are nothing new. One well-known case involved the spread of Sandworm malware a few years ago. But
Read MoreJun 26, 2017
HHS Cybersecurity Quick Response Cyber-Attack Checklist for HIPAA Covered Entities
The U.S. Department of Health and Human Services Office for Civil Rights ("HHS") recently issued a two-page quick response checklist
Read MoreJun 22, 2017
Podcast: Ethical Issues with Confidential Data
Whenever I have an ethical question here in Virginia, I go to Bar Counsel Jim McCauley, who has an encyclopedic
Read MoreJun 21, 2017
The New ACC Protection of Sensitive Client Data Guidelines for Outside Counsel
Well, it’s not precisely new. As pal Dave Ries reminded me, I had missed covering the March 29th announcement by
Read MoreJun 20, 2017
The 15 Worst Data Breaches of the 21st Century
It's not exactly an honor roll that CSO has published, but it sure makes for interesting reading. Hat tip to
Read MoreJun 19, 2017
US-CERT Issues North Korean Cyberattack Patch Warning
Naked Security reported on June 15th that US-CERT had issued an unusually blunt public warning to businesses about the threat
Read MoreJun 15, 2017
Reed Smith Releases Data Breach Notification App
On June 12th, global law firm Reed Smith announced the release of a free app to help companies apply complex
Read MoreJun 14, 2017
How Law Firm Letterhead Was Used in a Real Estate Wire Scam
Wiring significant sums of money is a serious business. So why do we trust e-mail instructions to wire money? KrebsonSecurity
Read MoreJun 13, 2017
Do You Know How to Protect Yourself If Your Smartphone is Stolen?
Amazingly, many people, lawyers included, don't take adequate security measures with their smartphones! Last week (thanks Dave Ries), the Federal
Read MoreJun 12, 2017
Yellow Printer Dots Reveal Identity of NSA Leaker
Ars Technica reported (thanks Dave Ries) last week on how NSA leaker Leigh Winner was identified. When reporters at The
Read More