October 21, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: Security labels on internet-connected devices are on the horizon for companies that manufacture and want to sell such devices worldwide. Last week, the White House National Security Council announced plans for a consumer products cybersecurity labeling program aimed at improving digital safeguards on internet-connected devices. On October 19, 2022,... Read More
October 6, 2022
Blog, Cyber Security, Insights & Impact Business Blog, The Privacy Hacks
By:
Mary Kate McDevitt
Takeaway: The latest directive from CISA will enhance federal agencies’ ability to identify vulnerabilities in their networks to prevent and respond to cybersecurity incidents. On October 3, 2022 the Cybersecurity and Infrastructure Security Agency (CISA) announced Binding Operational Directive (BOD) 23-01 entitled Improving Asset Visibility and Vulnerability Detection on Federal... Read More
October 3, 2022
Blog, Family Law Blog
By:
Carla Schiff Donnelly
While no two divorces are alike, high net worth divorces often have complex financial issues that require specific expertise. Think about it, if you had a parent who thought they had cataracts, you would not suggest they go see their internist. A neighborhood ophthalmologist that treats all sorts of eye... Read More
September 14, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
, Quintin DiLucente
Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a breach. In some circumstances, however, a party’s proposed expert may be challenged on the basis of unfair prejudice.... Read More
September 7, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
Takeaway: CISA and CGYBER recommend all organizations who did not immediately apply available patches to assume Log4Shell compromise and initiate threat hunting activities. In December 2021, the world was held hostage by hackers who found certain vulnerabilities in Log4Shell and exploited them. As part of this exploitation, suspected and advanced... Read More
August 24, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
, Mary Kate McDevitt
Takeaway: The recent vulnerabilities in Apple software has exemplified the importance of patch management and keeping devices up to date with the latest operating systems and software in order to protect the security of devices. The recent data breach reported by Apple, Inc. (“Apple”) has once again brought global attention... Read More
August 16, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
Takeaway: As cybersecurity risk increases, large enterprises and government agencies are, increasingly, forcing smaller vendor companies to obtain cyber insurance to help manage the risk of a data breach. To prepare for an annual cybersecurity insurance renewal or initial application, consider the following practices which could help address the risks... Read More
August 9, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: Governor Wolf signed a bill that authorizes the governor to order the Pennsylvania National Guard to assist local governments and private entities with cybersecurity support, training, and more. On July 7, 2022, Governor Wolf approved House Bill 2412, which authorizes the governor additional powers under Title 51 to order... Read More
August 4, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Quintin DiLucente
Takeaway: The DOJ’s Cyber Fraud Initiative and qui tam actions under the False Claims Act represent signification enforcement mechanisms for cybersecurity contractor compliance. On the eve of 2022, the United States began imposing new, punitive cybersecurity measures aimed at making the internet a safer platform for businesses to share and... Read More
July 29, 2022
Blog, Insights & Impact Business Blog, The Privacy Hacks
By:
Christopher A. Iacono
Takeaway: With ransomware attacks increasing over the past few years, healthcare organizations can expect hackers to make ransom demands while holding their computer systems hostage. Everything comes back in style. In the 90s, computer hackers learned how to infiltrate networks, hold them hostage, and demand payment to make them functional... Read More