Close

Cybersecurity & Data Privacy

Updated:

Check the Details of M&A Before Putting up a “For Sale” Sign

Lindabury partner, Robert Anderson, shares his insight in NJBIZ’s recent article:  “The inside scoop on M&As: Plenty of big companies have learned the hard way how difficult mergers can be” Sometimes, a planned M&A can get torpedoed because of decisions that were made long ago, notes Robert W. Anderson.  So a…

Updated:

Post-Equifax: What Do We Do Now?

By now, everyone has likely been inundated with information about the Equifax data breach.  If you are one of the few who has not heard about what happened, here’s the short version: Equifax suffered an enormous security breach as a result of its poor data privacy hygiene resulting in over…

Updated:

Lessons Learned from Target’s Data Breach Settlement

By now, most people are familiar with the 2013 data breach reported by Target. Described as one of the largest data breaches in U.S. history, Target acknowledged that hackers gained access to credit card and debit card data from up to 40 million of its customers. In the time since…

Updated:

Executive Order to Bolster New Jersey’s Cyber Security

On June 1, 2017, New Jersey Governor Chris Christie signed Executive Order 225 directing NJ’s Chief Technology Officer to set in motion actions to deliver a more secure, efficient, and reliable information technology platform and services across the Executive Branch. Previously, each state department and agency oversaw its own information…

Updated:

Cybersecurity: The legal response | NJBIZ

Lindabury’s Cybersecurity and Data Privacy Practice Group Co-Chair Eric Levine spoke at the NJBIZ Cybersecurity conference on May 17th at the Raritan Valley Country Club in Bridgewater, explaining how companies can get hurt by doing the right thing when it comes to cybersecurity. “To protect any small business, you need…

Updated:

Forget About the Firewall: Employees are First Line of Defense Against Cyberattacks

Eric Levine, Lindabury’s Cybersecurity and Data Privacy Group‘s Co-Chair was recently interviewed by NJBIZ’s Brett Johnson regarding a business’s first line of defense against a cyberattack. Levine says the approach exploits features inherent to human nature. “It’s preying on people’s inquisitive side,” Levine said. “And you can’t buy a firewall…

Updated:

N.J. Cyber-Experts: Another Attack Is Coming — Here’s The No. 1 Thing To Do (And Not To Do)

Lindabury’s Bob Anderson, shareholder and co-chair of the Cybersecurity and Data Privacy Group, was interviewed by NJBIZ‘s Tom Bergeron in response to the worldwide ransomware attack over the weekend. Bob said the attacks last weekend were not a surprise at all to the people in the industry. “It was just…

Updated:

GOOGLE Docs Incident Provides a Real-Life Example of the Dangers of Phishing

May 3, 2017 was a bad day for Google as a major phishing attack spread like internet wildfire, targeting users of Google docs. However, as bad as it was for Google, it provided us with a real-life example of how the first line of defense to a cyber-attack is none…

Updated:

Cybersecurity Insurance Considerations For Small And Medium-Sized Businesses

Cybersecurity experts have observed that hackers and cybercriminals are increasingly targeting small and medium-sized businesses and that these efforts account for 60% of all cyberattacks. One expert described these companies as the “soft underbelly” of cybersecurity. Companies of all sizes face potentially significant costs in responding to a data breach…

Updated:

Cybersecurity and the Importance of Attorney-Client Privilege

Businesses have a major need to assess their own cybersecurity risks, and to openly exchange internal information within the company to effectively address and mitigate an actual breach situation. Yet a company’s internal assessments of its own weaknesses and the holes in its cybersecurity protections can, ironically, actually expose the…