Misery loves company, you could say, but when you are the guardian at the gate, this may be company you don’t want to keep. In “Highlights of Verizon’s 2019 Data Breach Investigations Report,” Sharon Nelson, takes on and highlights Verizon’s most recent survey. In short, the news is not good for anyone in general, and professionals in particular.
The noted authority, Sharon D. Nelson, Esq., recently reported in her Ride the Lightning Blog: “Bank Sued Over Court Filing Containing Lawyers’ Personal Information,” a thorny bank litigation case that serves to highlight the critical importance of courts and litigators coming together to jointly adopt state-of-the-art infosecurity software and protocols.
In an article by Victoria Hudgins, writing for LegalTechNews.com, “Sink or Swim: Law Firms Need to Leverage, Understand Tech to Survive,” stated, “For law firms and their in-house partners to survive and thrive, differentiating services and analyzing big data will be key, while understanding and harnessing technology are the first big steps, according to a Wolters Kluwer survey.”
Reuters tech/biz writer, Jonathon Stempel, recently reported in “Yahoo strikes $117.5 million data breach settlement after earlier accord rejected,” that the settlement is the largest common fund class action settlement in data breach history. The implications of this settlement (revised from an early attempted settlement in hopes of being more palatable to federal district Judge Lucy Koh) are staggering.
Topics: Differentialsharing, compliance, riskmanagement, databreach, data breach, Yahoo breach, unsecured data, sensitive information, sensitive data, security, risk management, financial risk, Yahoobreach
In the Washington Post article, entitled “Millions of sensitive Facebook user records were left exposed on public web, security researchers say,” Post reporters Tony Romm and Elizabeth Dwoskin report that over a half billion Facebook records have been sitting exposed to any comers on an Amazon cloud-computing server. Cybersecurity implications – and lessons –keep spinning off from the social media giant’s privacy stumblings.
In the Washington Post article titled “FEMA ‘major privacy incident’ reveals data from 2.5 million disaster survivors,” reporters Joel Achenbach, William Wan, and Tony Room reveal a shocking security failure by the Federal Emergency Management Agency (FEMA). The failure included the unnecessary and unauthorized sharing of personal information, including banking details and home addresses, of disaster victims from the 2017 California wildfires and Hurricanes Harvey, Irma and Maria.
Today’s General Counsel recently commented on tech-security writer Jason Kichen’s article published in securityboulevard.com, “Want to Weed Out Anomalies? Use an Adversary Mindset,” raising awareness for General Counsel of the cybersecurity phenomenon known as “anomaly deluge.”
In his February 2019 article for Law Journal Newsletters, “’Dark Overlord’ Hack Shows Mounting Cyber Risks for Law Firms” law firm global strategy and economics writer Dan Packel reports on a law firm’s worst nightmare: potentially becoming the weak link in a global extortion plot related to the 9/11 World Trade Center attacks.
Jason Tashea’s 1/10/19 article in the ABA Journal online, “How to redact a PDF and protect your clients,” further affirms the dangers of legacy software, underestimating technology risk, and mindset; yet it fails to identify current Infosecurity software solutions.