Uncategorized Archive
GoDaddy is investigating a series of attacks on its infrastructure that it first learned about following customer complaints late last year. Website owners said that their sites were redirecting visitors to random domains in what later transpired to be a …
If you’re bringing your small business into the online space, then cybersecurity needs to be a priority. As soon as you connect to the Internet, you increase the risk of cyber attacks and data breaches – and this is an …
In efforts to curb cybersecurity and privacy issues, governments around the world have been tightening legislation on how organizations collect and share data. The most effective way to comply with these requirements is to draft the appropriate contracts. This is …
The popularity of online therapy services such as BetterHelp and Talkspace has skyrocketed since the pandemic, as the stigmas associated with mental health fade and individuals feel empowered to take charge of their mental well-being. Although many people swear by …
Product liability has been a significant area for class action litigation, with billions of dollars of awards made. Recent litigation includes cases against Johnson & Johnson and Bayer, which began after the organizations’ products were found to increase the risk …
An information security policy is a crucial document in an organization’s repertoire, providing an overview of its data protection requirements. A central information security policy provides a broad summary of necessary actions, which is supported by specific policies related to …
In the early hours of September 18, a criminal hacker posted an hour’s worth of footage from Grand Theft Auto VI to an online forum in what has been described as the biggest security breach in video game history. In …
A data breach is a type of security incident that leads to the accidental or unlawful destruction, loss, alteration, authorized disclosure of, or access to, sensitive information. These incidents occur when personal information is mishandled, whether through malicious intent, carelessness, …
The U.S. has had an uneasy relationship with cybersecurity regulation. Its rules are largely governed on a state level, creating a patchwork of overlapping requirements that makes it a nightmare for organizations that operate across state lines. Depending on the …
The video conference platform Zoom has disclosed four new software vulnerabilities that expose users to cyber attacks. Cyber security researchers found that the vulnerabilities can be used to compromise users over the platform’s chat function. This is possible if criminal …