In the previous post, we began to summarize the key amendments to Florida’s breach notification statute, all of which should be taken into consideration when creating or updating a...
In recent posts, we’ve been discussing the growing importance of incident response planning, why cybersecurity incident response is as much a legal issue as an IT issue, and what your...
In the previous post, we discussed how an incident response plan, not security tools, will ultimately determine the impact of a cybersecurity breach Losses can be staggering in terms of data,...
Some of the largest organizations in the world, with the most advanced security tools and highly qualified security personnel, haven’t been able to stop cybersecurity breaches As a result,...
Many of today’s business phone systems have call recording functionality In fact, this is often a standard feature with voice over IP (VoIP) phone systems, which transmit audio over data...
In the previous post, we began to lay out the highlights of the Federal Communications Commission’s recent Declaratory Ruling about the Telephone Consumer Protection Act (TCPA) The most...