20 May 2016

Tech Essentials: Hashed but not Salted

Screenshot (192)
Share:

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012. The shocking enormity of this data breach is attracting many security analysts to scrutinize the breach itself.... Read more...

Screenshot (192)
Share:
16 May 2016

Understanding HIPAA: Enforcement, Encryption, and Documentation

Hipaa-Image-2
Share:

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA auditors who have been redoubling their efforts to investigate non-compliance across the health... Read more...

Hipaa-Image-2
Share:
11 May 2016

The Biggest Threat to Your Online Security Could be Your Password

password
Share:

Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the latter story, the hacker known as “Guccifer” claims he correctly guessed Clinton confidant Sidney Blumenthal’s... Read more...

password
Share:
09 May 2016

ABA Model Rule Supports Email Encryption

aba_logo_02_blue_300.ashx_
Share:

Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption. In 2012, the American Bar Association approved a number of changes to the Model Rules of Professional Conduct. Of particular interest is the comment to Model Rule 1.1: To maintain the... Read more...

aba_logo_02_blue_300.ashx_
Share:
05 May 2016

Changing Trends in Cyber Security

Share:

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues. While painful, the cost of these was generally in the hundreds of dollars and perhaps a few hours of inconvenience. Today, we see a convergence of trends that is changing the dynamics of cyber security for individuals... Read more...

Share: