{"id":3457,"date":"2018-06-08T14:18:41","date_gmt":"2018-06-08T18:18:41","guid":{"rendered":"https:\/\/www.lindabury.com\/firm\/?p=3457"},"modified":"2018-06-25T11:31:33","modified_gmt":"2018-06-25T15:31:33","slug":"protecting-privilege-before-and-after-a-cyber-breach","status":"publish","type":"post","link":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html","title":{"rendered":"Protecting Privilege Before and After a Cyber Breach"},"content":{"rendered":"<p>If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber crime is probably the greatest threat to your bottom line today.<\/p>\n<p>One of the most important things a company\/firm can do is to regularly conduct an investigation to understand what its cybersecurity defense weaknesses and vulnerabilities may be. The results of such an investigation most likely will produce a lengthy list of potential problem areas that in an ideal world should all be promptly and exhaustively remedied. Many times, this remedial approach is not feasible as most companies have budgetary and other practical limitations that may require them to prioritize which vulnerabilities to address first, and the degree of remediation of each such vulnerability that can reasonably be undertaken at a given time.<\/p>\n<p>Unfortunately, another problem with this scenario is that the company or firm will end up with a written report identifying all variety of cybersecurity weaknesses, and then a set of actions that address some \u2014 but not all \u2014 of those weaknesses. If, at a later date, the organization experiences a cyber breach incident, this written report is likely to become Exhibit A of any plaintiff action against the company over that breach. The report, after all, shows that the company or firm clearly knew about certain vulnerabilities and chose not to remedy several of them.<\/p>\n<div class=\"read_more_link\"><a href=\"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html\"  title=\"Continue Reading Protecting Privilege Before and After a Cyber Breach\" class=\"more-link\">Continue Reading \u203a<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber crime is probably the greatest threat to your bottom line today. One of the most important things a company\/firm can do is to regularly conduct an investigation to understand what its [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[307,88,65,64],"tags":[],"coauthors":[207,178],"class_list":["post-3457","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-data-privacy-insights","category-levine","category-insights","category-anderson"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Privilege Before and After a Cyber Breach &#8212; June 8, 2018 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events<\/title>\n<meta name=\"description\" content=\"If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Privilege Before and After a Cyber Breach &#8212; June 8, 2018 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"og:description\" content=\"If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html\" \/>\n<meta property=\"og:site_name\" content=\"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-08T18:18:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-25T15:31:33+00:00\" \/>\n<meta name=\"author\" content=\"Robert W. Anderson, Eric B. Levine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert W. Anderson, Eric B. Levine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Privilege Before and After a Cyber Breach &#8212; June 8, 2018 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html","og_locale":"en_US","og_type":"article","og_title":"Protecting Privilege Before and After a Cyber Breach &#8212; June 8, 2018 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","og_description":"If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber","og_url":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html","og_site_name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","article_published_time":"2018-06-08T18:18:41+00:00","article_modified_time":"2018-06-25T15:31:33+00:00","author":"Robert W. Anderson, Eric B. Levine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert W. Anderson, Eric B. Levine","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html","url":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html","name":"Protecting Privilege Before and After a Cyber Breach &#8212; June 8, 2018 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","isPartOf":{"@id":"https:\/\/www.lindabury.com\/firm\/#website"},"datePublished":"2018-06-08T18:18:41+00:00","dateModified":"2018-06-25T15:31:33+00:00","author":{"@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f"},"description":"If you are not already thinking about cybersecurity for your company or firm, you should be. Regardless of your organization\u2019s size or industry, cyber","breadcrumb":{"@id":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lindabury.com\/firm\/insights\/protecting-privilege-before-and-after-a-cyber-breach.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.lindabury.com\/firm\/insights"},{"@type":"ListItem","position":3,"name":"Protecting Privilege Before and After a Cyber Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.lindabury.com\/firm\/#website","url":"https:\/\/www.lindabury.com\/firm\/","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"Published by Lindabury, McCormick, Estabrook &amp; Cooper","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lindabury.com\/firm\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/image\/3f2ca7450f0195db092bccff4fb8982e","url":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","caption":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C."},"sameAs":["https:\/\/www.lindabury.com"]}]}},"yoast":{"focuskw":"","title":"","metadesc":"","linkdex":"","metakeywords":"","meta-robots-noindex":"","meta-robots-nofollow":"","meta-robots-adv":"","canonical":"","redirect":"","opengraph-title":"","opengraph-description":"","opengraph-image":"","twitter-title":"","twitter-description":"","twitter-image":""},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/3457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/comments?post=3457"}],"version-history":[{"count":4,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/3457\/revisions"}],"predecessor-version":[{"id":3482,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/3457\/revisions\/3482"}],"wp:attachment":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/media?parent=3457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/categories?post=3457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/tags?post=3457"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/coauthors?post=3457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}