It has been reported by Bloomberg Law that the Colonial Pipeline ransomware attack was caused by a “single compromised password.” The Colonial Pipeline ransomware attack had consumers hoarding gasoline and disrupted distribution of gas along the east coast. One single compromised password.

Colonial Pipeline paid $4.4 million in ransom following the attack, although the Department

When I conduct employee education sessions on data privacy and cybersecurity, I am often surprised that employees are unaware that their employers are legally able to monitor their use of company assets, and that employers are indeed doing just that. Although some might find this creepy, if an employee is using an employer’s laptop, network

Robocalls continue to be irritating and their increased frequency is distracting and exhausting, at least in my experience. We can usually spot them when our caller ID says “potential spam” or if we don’t recognize the number, but robocallers are getting more sophisticated, just like other scammers.

A frequent and increased scam is one alleging

The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy. On May 6, 2021, EFF posted a blog that is relevant to my experience when I give training to employees about

The United States government, states, municipalities, and private companies all have been trying to defend themselves from cyber warfare from foreign adversarial governments, including Russia, China, and North Korea, for years—actually, for decades. Even when I started practicing full time in this area of law in the early 2000s, we were talking about not traveling

Many individuals already use facial recognition technology to authenticate and authorize payment through their smartphone. According to Jupiter Research, by 2025 (only four years away), 95 percent of smartphones will have biometric technology capabilities for authentication, including face, fingerprint, iris, and voice recognition. According to Juniper Research, this will amount to the authentication of over