Law Enforcement Response
How to Send Breach Notifications
It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do you do now? You’ll have to secure your network and determine which data may have been breached. But after you’ve shored up your systems, there’s still more work to do.…
Read MoreBreach Notification Basics
Data breaches are becoming worryingly common. According to the Identify Theft Resource Center, there were 817 data breaches in the U.S. in the first half of 2022. Even if you have cyber security training for your employees and focus on securing your company’s network, breaches can happen. So, what do you do if you’ve had…
Read MorePart Three: How to Establish Quality Control
You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your law enforcement specialists. They have process documentation to follow. You’ve made it easy for Law Enforcement to know how to submit their requests. But how do you know if everyone is following through with the…
Read MorePart Two: A Standardized Law Enforcement Response Program
As we discussed in Part One, there are a lot of external pieces to consider when you receive a data request from Law Enforcement (LE). There are different laws, different types of requests, and different kinds of content. But you must also consider all the moving parts in your own company. A standardized process will…
Read MorePart One: Law Enforcement Requests Overview
Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request for data, such as a subpoena, court order or warrant. And if not, there’s a chance you soon will. In today’s world, it’s nearly impossible to run a business without being online. Therefore, almost all companies have…
Read MoreData Privacy Laws and Their Contributions
The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. Learning platforms have increased in accessibility. Businesses are more streamlined. And even out-of-town family and friends are staying connected. As technology becomes more sophisticated, there is a growing demand for data privacy laws and regulation. Recently, the…
Read MoreCybercrime 101: A Brief Introduction
In today’s world, cybercrime is quite common. And it’s expected to continue rising at unprecedented rates. In fact, every American citizen should presume that all of their data has already been stolen and can be found by cybercriminals on the dark web. What is Cybercrime? Cybercrime occurs when a computer is the object of a…
Read MoreAll You Need Is Love (All They Want Is Your Wallet): A Brief Review of Online Romance Scams
Perhaps no tenet of the human experience has inspired greater artistic expression than the concept of romantic love. Humans often yearn to find that special someone. However, as we know from literature, love stories don’t always have a happy ending. In my first installment of an ongoing series about Internet crimes, I take a look…
Read More