Skip to content

Posts from the ‘Cyber Security’ Category

WIN8: Microsoft’s Misstep?

The author runs the table on OSes:  I have a Linux-laptop, a Windows XP laptop and desktop, a Windows Vista laptop, a Windows 7 laptop, and a Windows 8 laptop.  To call Windows 8 a “disappointment” is like calling the Atlantic Ocean a puddle…  You may be wondering what Windows 8 has to do with business law.  The fact of the matter is that Windows, in its various versions, is the most popular software ever, and the migration (or failure to migrate) to a new version is a major business concern.

More importantly, Windows XP, sometimes billed as “the most popular operating system ever,” is set to reach “End of Life” less than a year from now, on April 8, 2014.  This might not seem like an issue, but millions of users, particularly businesses, continue to use the venerable Microsoft XP operating system.  For those of you who are visual, consider the following data from Netmarketshare:

Read more

Another Lesson Learned: Instagram Quickly Backtracks After Angering Its Users

This week, users of Instagram scored a victory with the company’s management over a plan to amend Instagram’s terms of service that would allow the third-party use of users’ photos without their permission or any form of compensation.  This change, which was scheduled to take effect in mid January, caused an uproar among Instagram’s user base.

Read more

Now That the Cyber Security Act of 2012 Was Defeated, What is Next?

Congress has a lot of important work to do in this “lame duck” session including the important task of avoiding the “fiscal cliff” (which I have previously spoken about).  Just as important is developing and passing legislation to marshal government and private resources to help prevent critical networks (belonging to both the Government and industry) from being hacked.

Unfortunately that will not happen this legislative session.

Read more

Don’t Be Caught Surprised: Internet Law Now Touches Every Aspect of Businesses

What is Internet law?

I get that question a lot.  When you think of it, the Internet and the law the governs has pervaded society over the last ten years and its expansion and this integration will continue.  This will be especially true for businesses – hence the name for this blog.  Below the jump are some examples of common trends and issues:

Read more

Cyber Security Breach Exposes Millions in South Carolina

The words “shocking” and “unprecedented” come to mind – even from a cyber security attorney.  South Carolina’s Department of Revenue suffered a massive cyber security breach that exposed 3.8 million tax returns.  The data retrieved from those tax returns included full social security numbers and bank account information.  When reading about how easy it was for the hacker to gain access to this information, it is as disturbing as it is shocking that South Carolina was so careless in protecting its citizen’s information.  Now millions of South Carolina taxpayers could see their personal information sold to worldwide criminal syndicates, have their credit histories ruined, and suffer a headache that could last a lifetime.  For that pain, South Carolina is offering one free year of credit monitoring (at a cost of $12 million to the state government) and released an information sheet.

Read more

The Digital Ag(u)e: FCC launches “Small Biz Cyber Planner 2.0” to help confront cybersecurity concerns

Did you know that October was “National Cyber Security Awareness Month”?  Neither did I or anybody else, and I do this for a living.  The fact of the matter is that issues with cyber security are omnipresent, and growing in both number and severity.  Foreign nations, which will go unnamed here (but didn’t in recent presidential debates), continue to hack government computer systems, even as “activist groups” hack companies, and employees are accused of undermining their employers’ computer systems.

Read more

The U.S. (and the World) is Losing the Fight Against Hackers

Late last week, Verizon released their annual Data Breach Investigations Report. With collaboration from the U.S. Secret Service, the Dutch High Tech Crime Unit, the Irish Reporting and Information Security Service, the Australian Federal Police, and the Police Central e-Crime Unit of the London Metropolitan Police, the 2012 report releases some staggering numbers: “hacktivists” (hacker activists, including the group Anonymous) were responsible for 58% percent of all thieved data in 2011. Verizon has been tracking hacktivist activity since 2004 and said that 2011’s breaches exceeded the total from all other years combined. Read more

Breaking: Facebook Fights Back Against Employers Seeking Passwords

It is not surprising that Facebook would take a hard line against employers (and potential employers) who are seeking passwords from people’s Facebook accounts.  We blogged about it here a few days ago.

If this trend grows (or at least has that perception), many people may stop using Facebook altogether which would (naturally) not be good for Facebook.  Legally, there is not a whole lot Facebook could do at this juncture because they would not have standing to sue these (potential) employers.  For now, a strongly worded statement will have to suffice.

We have the statement from Erin Egan (which was released this morning) below.

Read more

GSA Gets Serious About Contractor IT Security

Do you currently have or hope to win an IT 70 schedule contract with the General Services Administration (GSA)?  Are you ready to share your IT security secrets with the government?  Do you feel like dedicating significant resources to yet another government contract compliance program?  If your answer to the first question is “yes” and to the last two questions is “no,” you might want to read further.

Read more

The New War: Cyber Security for Government Contractors

Nearly every week we learn of new cyber security breaches brought by unknown nations and infamous groups such as Anonymous.  It is not inconceivable that our next war will solely be fought on the “cyber” front and contractors of all shapes and sizes will be on the front lines.  Even now, each and every contractor is affected by the looming cyber security threat.  For instance, some contract holders now have to develop and file an IT Security Plan within 30 days of contract award.  Moreover, many states have reporting requirements when there is a breach that releases personal information.

Read more

%d bloggers like this: