Networks - Data Security/Technology

RSM US
Monday, May 6, 2019

The cybersecurity threat to the middle market is growing, but the organizations now in cybercriminals’ sights have only become more confident in current protections. Generally, companies have taken steps to improve cybersecurity, but criminals are becoming more sophisticated and determined.

Gary Newton, Lutz
Friday, May 3, 2019

Cyber security is a subject that continues to make headlining news. Because every business is at risk of a cyberattack, it’s important to know what types of threats your business could be subject to and understand the techniques you can implement to help prevent attacks from happening. 

Neil Wardyn, Lutz
Wednesday, May 1, 2019

If you find your growing business suffering from a lack of support in the technology department, then your company may benefit from outsourcing IT.

Hanna Vasina, Lutz
Wednesday, May 1, 2019

Potential drains on business efficiency include groups of remote workers unable to communicate well with one another, tools that make it hard to adapt to changes or new needs quickly, and the high cost of equipment and IT personnel. Cloud-based solutions address these areas and more.

HUB International Personal Insurance
Friday, April 26, 2019

New cyber breach scenarios are constantly emerging, and they bring with them a variety of new claims. The fact that there’s no industry-standard cyber policy language makes it a tremendous challenge to ensure your Cyber Risk insurance will really protect you.

HUB International Personal Insurance
Thursday, April 25, 2019

In a ransomware attack, a hacker penetrates an organization’s network and holds its data hostage until a specified ransom is paid. Hackers don’t discriminate based on business size or industry—any organization that stores its data on a network is at risk.

Vorys, Sater, Seymour and Pease LLP
Tuesday, April 23, 2019

Massachusetts Governor Charlie Baker recently signed House Bill 4806, amending the state’s data breach notification law.

Vorys, Sater, Seymour and Pease LLP
Tuesday, April 23, 2019

Due to the evolving sophistication of criminals, security breaches continue to occur on a regular basis.

Northern Trust
Tuesday, April 16, 2019

Prevention matters, and knowledge is the key to prevention. By understanding exactly what identity theft is, how it happens, and how it affects you, you will be better able to prevent and, if necessary, resolve identity theft.

Northern Trust
Monday, April 15, 2019

As threats continue to mount, understanding and managing cybersecurity risks has become top of mind for leaders in business and government. According to the Federal Trade Commission, business executives often ask how to manage confidential information.