Cybersecurity & Privacy

VIEW OUR CYBERSECURITY & PRIVACY BLOG:
The Privacy Hacks

The proliferation of electronically stored data – and the corresponding growth in incidents of data breaches, hacking, and government regulation – has raised the bar for corporations, and their directors and officers, to ensure the security of confidential data and proprietary information.

Pietragallo’s Cybersecurity & Privacy team understands the complexity of cyber-related issues and actively oversees the ever-changing landscape of data privacy laws across the United States and abroad. Our clients include a variety of small and midsize corporate entities within the healthcare, financial services, government contracting, telecommunications, and retail industries.

We have assisted our clients in a variety of data security, privacy, cyber liability, and technology matters including:

  • Responding to regulatory entities
  • Developing strategy to evaluate and mitigate damages
  • Self-reporting, as required by federal and state laws
  • Data security and compliance
  • Handling situations of lost, stolen, or damaged data due to corporate network and information security policies
  • Hacking or other unauthorized access of confidential information or trade secrets
  • Alleged failure to maintain security of confidential data including names, addresses, patient health data, credit card numbers, financial and wage information, and social security numbers
  • Threat of unauthorized release of data by a former employee or vendor
  • Lost or stolen computers, smartphones, tablets, or memory devices
  • Charges brought under the Computer Fraud and Abuse Act (CFAA)
  • Cyber-bullying
  • Threats made via e-mail or social media
  • Identity theft

Contact

Christopher A. Iacono — CAI@Pietragallo.com

Martin T. Shepherd — MS1@Pietragallo.com

News & Events

Requirements of Cybersecurity Expert Testimony in the Third Circuit
September 14, 2022
Takeaway: In many data breach cases, a cybersecurity expert may evaluate whether the company’s security measures were reasonable and appropriate or, alternatively, if the company lacked the requisite technology to detect a breach. Read More
Bad Actors Continue to Exploit Log4Shell Vulnerabilities
September 7, 2022
Takeaway: CISA and CGYBER recommend all organizations who did not immediately apply available patches to assume Log4Shell compromise and initiate threat hunting activities. Read More
Decoding the Recent Apple Security Updates
August 24, 2022
Takeaway: The recent vulnerabilities in Apple software has exemplified the importance of patch management and keeping devices up to date with the latest operating systems and software in order to protect the security of devices. Read More
View More News & Events