Equifax Breach Will Fuel Identity Theft Remediation Debate
November 01, 2017
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.
Bitcoin Is Fueling the Ransomware Epidemic
October 02, 2017
Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.
The Myth of the Secure Cloud
October 02, 2017
“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
DRaaS: How It Takes a Law Firm's DR Beyond Insurance
October 02, 2017
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
The Myth of the Secure Cloud
October 02, 2017
"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
The Equifax Breach: Why This One Is Different
October 02, 2017
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.