“The FTC Data Breach Response pamphlet is divided into three sections: (1) Secure Your Operations; (2) Fix Vulnerabilities, and (3) Notify Appropriate Parties. It also provided the outline of a generic breach notification letter, which might serve as a starting point.” http://ow.ly/BOOO305CX7G
“… the best pro-active strategy is to place a credit freeze on your account so no one can open an account in your name without your knowledge and authorization. You can contact any of the three credit bureaus to find out how to place a credit freeze on your account, and the pros and cons of doing so” http://ow.ly/89rA305wy98
I found this article not to be written well, but the last sentence caught my eye. “…the Justice Department issued a memo in September saying it was developing a new code of professional responsibility for its forensic science laboratories, including asking forensic examiners and prosecutors to no longer use the phrase “reasonable scientific certainty” in their reports or testimony.” http://ow.ly/GKzn305pfYk
Was there any doubt this was going happen? http://ow.ly/JJQ2305fXUm
“Curious about the legal fallout from recent cyberattacks on banks using the SWIFT system, but only have a few minutes to spare? Get up to speed with our inaugural “5 Minutes Max” video.” http://ow.ly/tR6U305bwz8
You’ll want to do this.
“…take advantage of security researcher Troy Hunt’s “Have I Been Pwned?” service, which allows you to search for your details in wide range of data breaches, and has been updated to include the information exposed in the Modern Business Solutions hack.” The link is https://haveibeenpwned.com/.
“According to the FBI, some companies never get a decryption key, even after payment. And, every payment “emboldens the adversary to target other victims for profit,” incentivizing similar conduct by other criminals seeking financial gain.” http://ow.ly/45cM3051YzL
“Representing a victim in a criminal matter is not your run-of-the-mill pro bono case, and involved a number of considerations, strategies, and skills distinct from our daily civil litigation practices. Below, we discuss several of the issues we encountered before, during and after trial, and the approaches and resolutions with each.” http://ow.ly/6OdC304VxtD
“Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.” http://ow.ly/4aLE304SxmC
“To build a world-class threat intelligence capability, the first thing you’ll need is at least one highly skilled and experienced human analyst http://ow.ly/y9Y3304OgcA