Blog Archives

Cybersecurity Best Practices in the Remote-Working Environment

In the wake of the COVID-19 crisis, much of the workforce has shifted to working remotely, with many workers operating out of makeshift “offices” they created in their homes with little or no warning. Along with this remote work comes

Tagged with: , , , , , ,
Posted in Data Security, Policies and Procedures, Privacy, Uncategorized

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings.  The caller ID says it’s your attorney’s office.  When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number.  When you call the number, you are told how

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Security, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Subscribe For Updates

cyberlawmonitor

Cozen O’Connor Blogs