Companies are increasingly choosing not to pay ransom for ransomware and extortionware due to the growing associated risks. In fact, a recent report by crypto-crime analyst firm Chainalysis found that payments to threat actors for ransomware and extortionware was down...
Cyber Security & Data Breach
Security Updates as Hostage Takers
This article was originally published by Security Boulevard (https://securityboulevard.com/2023/01/security-updates-as-hostage-takers/). Software updates are an essential part of modern technology, as they provide necessary fixes, improvements and new features to...
AirTag Stalking: Murder, Fear and Litigation
This article was originally published by Security Boulevard (https://securityboulevard.com/). At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four...
Workplace Security: Zero Trust Network Access vs. Virtual Private Network
Virtual Private Networks Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead. The simplest and most commonly used analogy for...
Apple Users, Beware: Apple Security Vulnerabilities
Vulnerabilities in software and hardware are as common as weather changes in Northeast Ohio, and they aren’t going away any time soon. A few years ago, Intel announced vulnerabilities in virtually every computer processor produced, and its largest competitor, AMD, has...
New FTC Action on Data Security: Here’s What You Should Know
On Aug. 11, 2022, the Federal Trade Commission announced a Notice of Proposed Rulemaking regarding the collection, sharing and use of certain information which it refers to as “commercial surveillance data” and whether the use of that data constitutes a violation of...
You’ve Been Hit by Ransomware: What Should You Do?
Despite your best efforts, you have been hit by ransomware. You are locked out of your system, and you can provide no services to your customers, clients or patients. From a business perspective, you need to get your system unlocked so you can get back to work. But...
US Law Firm Airdrops Court Order: NFTs Could Revolutionize the Legal Industry
Initiating a Lawsuit As our reliance on the internet grows, so do online scams. As a result, causes of action arising out of online activities are booming. People perpetuating online attacks frequently utilize pseudonyms, email addresses, cryptocurrency wallets or...
Connecticut Privacy Law: What Businesses Need to Know
Please note that this page is intended to be a summary. It is not a complete recitation of the applicable laws and/or regulations and is not intended to be used as legal advice. Connecticut Becomes the Fifth State to Pass Consumer Privacy Legislation Connecticut...
Utah Becomes the 4th State to Pass Consumer Privacy Legislation – Will the Federal Government Ever Catch Up?
The UCPA is the Nation’s Fourth State Consumer Privacy Law On March 24, 2022, Utah Governor Spencer Cox signed Utah Senate Bill 227, the Utah Consumer Privacy Act (UCPA) into law. The UCPA is the nation’s fourth state consumer privacy law, following California,...