Part of any good cybersecurity program rests on spreading good habits and inculcating employees with best practices around handling data and using network resources. In this cybersecurity is as much a behavioral challenge as it as a technological one. That’s precisely why the recent coronavirus outbreak, or COVID-19, is so potentially harmful to a company’s cybersecurity efforts.

Already, we have seen a large number of event cancellations and the shuttering of offices around the world as organizations attempt to balance public health concerns with business as usual. Many companies are actively encouraging their employees to work from home if possible. For organizations that do this routinely, coronavirus-related cybersecurity issues will be less of a concern; however, for a great many businesses, working remotely is not the norm, and it will necessarily disrupt work patterns and processes.


Continue Reading

Fresh off the heels enacting the California Consumer Privacy Act, California Governor, Jerry Brown, signed the country’s first law governing the security of Internet of Things or connected devices. The bill, SB 327, is entitled “Security of Connected Devices.”

Beginning on January 1, 2020, all manufacturers of connected devices will be required to equip the device with reasonable security features to protect against the unauthorized access, destruction, use, modification or disclosure of information that is collected or transmitted by the device.
Continue Reading

On March 15, 2018 the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) exercised its authority to issue cyber sanctions under Executive Order 13694 and the new Countering America’s Adversaries Through Sanctions Act (CAATSA) by imposing blocking sanctions against 5 Russian entities and 19 Russian individuals connected to previous Russian cyber operations directed towards the United States. In an accompanying press release, OFAC stated that these sanctions were intended to counter Russian destabilizing activities such as interference in the 2016 US election, the 2017 global NotPetya cyber-attack and other cyber-attacks directed at critical U.S. infrastructure sectors. One aspect of this move was somewhat puzzling, because 9 of the total 24 sanctioned entities and individuals were already subject to blocking sanctions for their previous activities. For those 9 sanctioned entities and individuals, (which include Russia’s Federal Security Service (the FSB) and Main Intelligence Directorate (the GRU), whose initial designation we covered here), it is unclear what OFAC seeks to accomplish by imposing blocking sanctions against them for a second time.

Continue Reading

healthcare technology iotThe influence of the Internet of Things (IoT) will undoubtedly be transformational with a total potential economic impact estimated to be $3.9 trillion to $11.1 trillion a year by 2025. In the race into the IoT marketplace, there are both known and unknown legal hurdles that will affect those who offer of goods and services during the proliferation of the Internet of Things.

Some of the current and potential legal hurdles related to the IoT are well known, some are not, and some are the result of the intersection between the physical and virtual worlds, and the collision between two intersecting major drivers of innovation in IoT. On one hand, there are the established manufacturers of products and consumer goods whose expertise in developing, testing and manufacturing products puts them in an advantageous position. On the other hand, there are the technology companies who are used to developing software and whose expertise lies in software development, data collection, and data processing.
Continue Reading

Social media cubesIt seems like we hear about a new data breach every week. Thanks to one of the most recent breaches, you could be only ten dollars away from getting in touch with your favorite A-list celebrity. Instagram — the Facebook-owned photo sharing company — was recently hacked due to a flaw in the program. Most recent reports indicate up to six million Instagram users’ email addresses and phone numbers may have been made public due to the data breach.

While the breach initially appeared to affect only celebrities and verified accounts, it has now been shown to affect a much wider range of accounts.


Continue Reading

data securityYou are an entrepreneur. You have great ideas. Those ideas are going to change your industry. In most cases, to accomplish those goals, you are going to need help from others. How do you protect your intellectual property and data? You need to focus on protecting those assets in the contracting process.

Most developing companies rely on third party service providers. As an entrepreneur, you will likely rely on hosting and cloud solutions. While we advise that you consider business considerations first, you should also consider legal issues relating to data privacy and security issues. You cannot achieve 100% security for your assets, but there are many ways to protect yourself. You should also consider obtaining cyber-liability insurance for your company and you should ask your service providers whether they have it.


Continue Reading

Shanghai ChinaThe newly passed Cybersecurity Law of the People’s Republic of China will take effect in June 2017, and it is expected to have a significant impact on multinationals doing business in mainland China. The law affects both domestic and foreign companies operating on the Chinese mainland and covers a wide range of activities including the use of the internet, information and communications technologies, personal data, national security and more.

The difficulties with determining the steps needed to comply with such sweeping changes are only complicated by the fact that a large number of key terms in the law have yet to be clearly defined. As a result, China’s new Cybersecurity Law will continue to evolve as the national government interprets it.

Here are some key provisions to follow in the coming months.


Continue Reading

swing sunset loveAny agreement between two parties begins with the rosy optimism that the good times will last forever. In the world of technology licensing and development, however, we know this is rarely the case. While this blog has previously considered data security oversight by the board of directors of the company, it is also important