This article was originally published by Security Boulevard (https://securityboulevard.com/2023/01/security-updates-as-hostage-takers/). Software updates are an essential part of modern technology, as they provide necessary fixes, improvements and new features to...
Cyber Security & Data Breach
Ohio Supreme Court Rules Insurance Policy Does Not Cover Ransomware Attack on Software
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still significant problems with its coverage that can...
AirTag Stalking: Murder, Fear and Litigation
This article was originally published by Security Boulevard (https://securityboulevard.com/). At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four...
Workplace Security: Zero Trust Network Access vs. Virtual Private Network
Virtual Private Networks Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead. The simplest and most commonly used analogy for...
Apple Users, Beware: Apple Security Vulnerabilities
Vulnerabilities in software and hardware are as common as weather changes in Northeast Ohio, and they aren’t going away any time soon. A few years ago, Intel announced vulnerabilities in virtually every computer processor produced, and its largest competitor, AMD, has...
New FTC Action on Data Security: Here’s What You Should Know
On Aug. 11, 2022, the Federal Trade Commission announced a Notice of Proposed Rulemaking regarding the collection, sharing and use of certain information which it refers to as “commercial surveillance data” and whether the use of that data constitutes a violation of...
You’ve Been Hit by Ransomware: What Should You Do?
Despite your best efforts, you have been hit by ransomware. You are locked out of your system, and you can provide no services to your customers, clients or patients. From a business perspective, you need to get your system unlocked so you can get back to work. But...
US Law Firm Airdrops Court Order: NFTs Could Revolutionize the Legal Industry
Initiating a Lawsuit As our reliance on the internet grows, so do online scams. As a result, causes of action arising out of online activities are booming. People perpetuating online attacks frequently utilize pseudonyms, email addresses, cryptocurrency wallets or...
Connecticut Privacy Law: What Businesses Need to Know
Please note that this page is intended to be a summary. It is not a complete recitation of the applicable laws and/or regulations and is not intended to be used as legal advice. Connecticut Becomes the Fifth State to Pass Consumer Privacy Legislation Connecticut...
The FBI Warns Clevelanders About a Rise in Digital Theft
Cellphones have become a necessity for many people throughout the world, allowing convenience and interconnectivity in the palm of our hands – but they’ve also opened the door to a new type of theft. On April 26, the Cleveland Field Office of the FBI issued a warning...