Search
Searching Content by Richard Lutkus from Seyfarth Shaw LLP ordered by Published Date Descending.
Links to Result pages
 
1  
 
Title
Country
Organisation
Author
Date
1
Top Five Most Common Cybersecurity Attacks And How To Prevent Them – Part 1: Email Spoofing And Wire Fraud
Every day all over the world, companies fall victim to cybersecurity attacks. It's nearly a constant these days.
United States
1 Mar 2019
2
Somebody's Watching Me: Considerations In Employee GPS Monitoring
When choosing a GPS location tracking app, California employers must consider several factors to see if the app unduly infringes on employee privacy.
United States
30 Jan 2019
3
NSA Backup Tape Spoliation
Eleven years into the court order levied on the NSA to preserve backup tapes containing data about the NSA surveillance efforts, it's come to light that the NSA failed to take adequate steps...
United States
16 Mar 2018
4
Andrew Lucano, Richard Lutkus, Tushar Vaidya Authored An Article In The ACG Chicago Journal
Andrew Lucano, Richard Lutkus, Tushar Vaidya authored a December 22 article in the ACG Chicago Journal, "Cybersecurity Threats May Be Lurking In Your Next M&A Deal."
United States
2 Jan 2018
5
Cybersecurity Best Practices
When you bring to mind someone "hacking" a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology.
United States
4 Oct 2017
6
What You Need To Know About The Petya Ransomware Attack
Yesterday, organizations around the world were hit by yet another ransomware attack.
United States
24 Jul 2017
7
On June 13, 2017, the Department of Homeland Security published an alert regarding malicious cyber activity by the North Korean government, known as Hidden Cobra.
United States
4 Jul 2017
8
WannaCry Ransomware Attack: What Happened And How To Address
Recently, a widespread global ransomware attack has struck hospitals, communication, and other types of companies and government offices around the world...
United States
19 May 2017
9
Court Orders Enterprise To Engage In Forensic Imaging And Analysis
In Realpage Inc. v. Enter. Risk Control, LLC, 2017 BL 102339 (E.D. Tex. 2017), the court ordered Enterprise Risk Control, LLC ("Enterprise") to produce forensic images of devices used by a former...
United States
11 May 2017
10
United States
8 May 2017
11
Proposed New York Cybersecurity Bill Requires Increased Protections For Financial Industry
On December 28, 2016, New York published a revised version of its proposed "Cybersecurity Requirements for Financial Services Companies" aimed at increasing the requirements and protections...
United States
19 Jan 2017
12
Is Data Really A "Toxic" Asset?
Calling data a "toxic asset" sensationalizes the data-security conversation into alarmist territory.
United States
15 Apr 2016
13
Webinar Recap! Data Security & Trade Secret Protection For Lawyers
We are pleased to announce the webinar "Data Security & Trade Secret Protection for Lawyers" is now available as a podcast and webinar recording.
United States
17 Mar 2016
14
Untrusted Advisor: How Your Law Firm May Fail To Protect Your Data
In recent years, the prevalence of data and information security breaches at major corporations have become increasingly more commonplace.
United States
9 Dec 2015
Links to Result pages
 
1