top of page

Blog

May 28, 20201 min read
Healthcare and Chemical Sectors - Get Ready for Changes!
While cybersecurity threats started with the invention of the World Wide Web, the frequency and intensity of these threats increase...

May 27, 20203 min read
Teams Chat and Zoom Meetings – The Next Wave of Discovery Disputes
Three chapters outline any shock to a civilization: 1) the event itself; 2) the immediate response; and 3) the ricochet effects. Today,...

May 26, 20204 min read
Create a Data Breach Response Plan Before the Inevitable
Preparing to defend and mitigate damage from a security breach is not fun. It is a frustrating and unpleasant use of human and financial...

May 21, 20203 min read
Hackers Use U.S. Laws Against Victims
U.S. victims of ransomware and malware are not chosen randomly. Although many black hat hackers are unaware that white hat activity is...

May 18, 20203 min read
Senate FISA Bill Asserts Privacy Limitations
On May 14, 2020, H.R.6172 - USA FREEDOM Reauthorization Act of 2020 passed the U.S. Senate, extending, amending, and curtailing FISA...

May 15, 20202 min read
Underestimated: Law Firm Data Breaches
Four days ago, the mega-firm of Grubman Shire Meiselas & Sacks (Grubman) was hacked. Now, personal and business information belonging to...

May 14, 20204 min read
3 Cyberspace Solarium Commission Recommendations to Watch in NDAA FY21
Progress on H.R. 6395, a.k.a. “National Defense Authorization Act for Fiscal Year 2021” is non-existent. Presently, it a skeleton bill...

May 12, 20200 min read

May 11, 20203 min read
INSIDER THREATS: C-SUITE EXECUTIVES AND FORMER EMPLOYEES
The COVID-19 pandemic forced several lessons onto American Businesses, one of which is to make cybersecurity a top priority in terms of...

May 8, 20203 min read
Who's Next? Hospitals and Pharmaceutical Companies Suffer Cyber Attacks
On May 5, 2020, the U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s...

May 6, 20203 min read
2 Lessons from Other’s Cyber Law Mi$take$
Unemployment is skyrocketing and businesses are scrambling to lower operating costs to avoid the bankruptcy trustees. In the rush to...

May 5, 20203 min read
Cyber Attacks Increasing Exponentially – The Targets, the Tactics, and Potential Defenses
Since January 2020, zscaler claims “an increase of 30,000% in phishing, malicious websites, and malware targeting remote users[.]”...

May 4, 20203 min read
LockBit: The New “It Girl” of Ransomware
In 2019, the following ransomware strains were dominant in the U.S. according to safetydetectives.com: CryptoLocker, WannaCry, and...


May 1, 20200 min read

Apr 30, 20203 min read
Bank Reaction to Caller ID Spoofing May Attract FTC & SEC Attention
On Tuesday, Krebsonsecurity posted an article describing a new telephone bank scam in which Citibank and a few customers fell victim to...

Apr 28, 20203 min read
5 Ways for Hospitals to Brace for Cyber Impact
Hospitals and healthcare organizations are struggling. Whether plagued by N95 mask shortages or liquidity issues caused by the inability...

Apr 27, 20203 min read
Cybersecurity Maturity Model Certification Compliance – Hurry Up and Wait!
Three months following the initial release of Cybersecurity Maturity Model Certification (CMMC) Version 1.0 from the Office of the Under...

Apr 26, 20203 min read
Cities with Drones Tracking Covid-19 Symptoms - Check the 4th Amendment
In the race to control the spread of Coronavirus and reopen the U.S. economy, many private and public entities seek innovative ways to...

Apr 24, 20202 min read
Report Sextortion Scams under Cybersecurity Information Sharing Act of 2015
For the last two months, @Lacyberlawblog and every other news and government website published articles and alerts about Coronavirus...

Apr 24, 20203 min read
5 Lessons from Fairfax County Public Schools’ Cybersecurity Failures
On April 21, 2020, the head of Fairfax County Public Schools' (FCPS) IT department resigned after repeatedly fumbling the launch of FCPS’...
bottom of page