Blog

Between the Lines Blog

Cybersecurity Enforcement Deadlines in the Wake of COVID-19
Category: Coronavirus (COVID-19), Cybersecurity, Privacy and Data Protection
While some regulations have been relaxed a bit to provide flexibility during shelter-in-place or other restrictive measures, one area that is generally not slowing down is privacy and cybersecurity. The past few years have seen a rollout of new privacy and cybersecurity measures at the state…
Read Full Post »
So What's All This About Zoom?
Category: Coronavirus (COVID-19), Cybersecurity, Privacy and Data Protection
For the time being, many Americans are at home due to the COVID-19 virus, but they are continuing to work, learning to homeschool and socializing with friends thanks to virtual platforms. Although there are a variety of applications and platforms, Zoom has landed on top and is quickly becoming a…
Read Full Post »
Location, Location, Location: What Will Your Personal Data Reveal Besides Whether or Not You #StayHome?
Category: Coronavirus (COVID-19), Cybersecurity, Privacy and Data Protection
As more and more Americans are learning the ins and outs of Zoom, receiving baptisms by fire in the world of homeschooling or simply catching the latest episode of "Tiger King," we are now on more screens than ever. Inevitably, more screen time leads to more social media and online surfing. Last…
Read Full Post »
Cybersecurity in the Time of COVID-19
Category: Coronavirus (COVID-19), Cybersecurity, Privacy and Data Protection
As the COVID-19 pandemic continues, hackers continue to target workers’ increased dependence on digital tools. Online activities have become the most effective channel for human interaction and continued operations. In current circumstances, a cyberattack removing a household or business’s ability…
Read Full Post »
Fueling the Fire: How Extortion Has Changed the Face of Data Breaches
Category: Cybersecurity, Privacy and Data Protection
Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old.[1] However, around the mid-2010’s, ransomware attacks really took off, growing in…
Read Full Post »
< Newer Page 1/2 Older >

View All Posts

View By Category

Archive

The Between the Lines blog is made available by Mitchell Williams Law Firm and the law firm publisher. The blog site is for educational purposes only, as well as to give general information and a general understanding of the law. This blog is not intended to provide specific legal advice. Use of this blog site does not create an attorney client relationship between you and Mitchell Williams or the blog site publisher. The Between the Lines blog site should not be used as a substitute for legal advice from a licensed professional attorney in your state.