The U.S. Supreme Court recently issued a ruling interpreting the scope of the Computer Fraud and Abuse Act (CFAA), a 1986 federal statute that imposes civil and criminal liability for unauthorized computer access. In short, the Court decided that as long as an individual is authorized to access a computer and data, he doesn’t violate […]
The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, has released a study titled, “2021 Trends in Securing Digital Identities,” based on an online survey of over 500 IT decision makers. The report examines the impact that the […]
Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]
It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]
We’ve talked before about the reasons an employer may benefit from implementing a bring-your-own-device (BYOD) policy in the workplace, such as cost reduction, improved employee satisfaction, the likelihood of better technology standards, and the decreased time to productivity on a personal device, just to name a few. But there are quite a few security risks, […]
On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.
World Backup Day was this past Wednesday. It’s a day dedicated to highlighting the value of good cybersecurity practices, like protecting your vital information by backing up all critical files, and locking them away from scam artists and hackers. That has never been more important than it is now. Last year, we saw cybercriminals seizing […]
A trend that has been growing for years is the use of bring-your-own-device (BYOD) policies, which allow employees to use their own personal devices such as phones and laptops for work.
In the wake of the COVID-19 pandemic, businesses that can have staff work remotely are doing so to a large extent. And remote work is likely to be more common in the long term than it was pre-COVID, with many companies expecting to make some of their COVID-inspired remote work changes permanent.
In light of the COVID-19 outbreak, companies have changed their core business operations and instituted new practices and procedures in the blink of an eye. The changes, perhaps unknowingly, have created risks that could jeopardize the protection of valuable trade secrets.