Blog

Between the Lines Blog

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches
Category: Cybersecurity, Privacy and Data Protection
Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old.[1] However, around the mid-2010’s, ransomware attacks really took off, growing in…
Read Full Post »
Municipalities vs. Ransomware Attacks - Who's Winning?
Category: Cybersecurity, Privacy and Data Protection
Ransomware attacks on municipalities were on the rise in 2019, with two-thirds of known ransomware attacks in the United States targeting governments, and the trend is expected to continue for 2020. It is important for city governments to be vigilant in regards to their cybersecurity, regardless of…
Read Full Post »
The Lawyer's Duty When Client Confidential Information is Hacked From the Law Firm
Category: Cybersecurity, Privacy and Data Protection
As attorneys, our livelihood is often heavily dependent upon the keeping of secrets. But in this complex electronic-data driven environment we work in, where physical security via locked doors and piercing alarms may no longer be solely sufficient to keep client confidences from prying eyes, what…
Read Full Post »

View All Posts

View By Category

Archive

The Between the Lines blog is made available by Mitchell Williams Law Firm and the law firm publisher. The blog site is for educational purposes only, as well as to give general information and a general understanding of the law. This blog is not intended to provide specific legal advice. Use of this blog site does not create an attorney client relationship between you and Mitchell Williams or the blog site publisher. The Between the Lines blog site should not be used as a substitute for legal advice from a licensed professional attorney in your state.