Photo of Kathryn Cole

In the span of a few short months, the number of phishing attacks targeting smartphones as the entry point to enterprise networks has risen by more than a third.  Indeed, one cybersecurity company found a 37% increase in mobile phishing attacks worldwide between November 2019 and early 2020.*

As previous blog posts have observed,

Smart speakers – like Google Home and Amazon Echo – have changed the way our homes/offices function.  Indeed, these voice-activated speakers execute simple commands provided by voice or smartphone application.  With nothing more than a question, one can direct the smart speaker to, among other things, play music and podcasts, provide a weather forecast, or

As we continue to conduct business virtually, non-traditional means of document execution are becoming increasingly popular. It is critical, however, to understand the laws and requirements associated with these non-traditional means so that a document that is electronically signed, or remotely notarized enjoys the same legal validity and effect as if signed, or attested to

A recent federal district court decision, Lawson et al. v Love’s Travel Stops & Country Stores, Inc., US Dist Ct, MD Pa, 1:17-CV-1266, Carlson, J., 2019, reminds litigants of the need to tailor discovery requests for electronically stored information (“ESI”).

Before the Court was plaintiffs’ motion to compel defendants’ production of “all” text

With much of the American workforce (and educational systems) working remotely, reliance upon videoconferencing software for workplace and educational collaboration has increased significantly. One of the more widely embraced platforms during the pandemic is Zoom Video Communications, Inc. (“Zoom”). According to the New York Times, around 600,000 people downloaded the Zoom application on March 15

As the coronavirus (“COVID-19”) causes countless companies and employers to implement remote working environments, millions of Americans will be working from home.  It is, therefore, critically important to remain vigilant about cybersecurity best practices.

As observed in recent news alerts, cybersecurity threats, perpetuated by opportunistic cyber-criminals preying on a vulnerable virtual workforce, are on the

Have you ever been involved in a meet and confer regarding electronically stored information and felt your adversary was speaking a foreign language?  Is active machine learning an unfamiliar concept to you?  Is BYOD an acronym for who-knows-what?

If you answered yes to any of the above, or if you lack fluency in the language

With the ever evolving cyber threats, it is important to we understand our social media accounts and the way in which they make us vulnerable.

Social media (i.e., Facebook, Instagram, WhatsApp, Snapchat…) is free to members because the companies make money by selling targeted advertisements to their users.  Ever wonder why, after “liking” a particular

As we become increasingly reliant upon our phones, we make ourselves more vulnerable to cyberattacks.  Indeed, Experian’s 2020 edition of its annual Data Breach Industry Forecast details five predictions for data breach trends, including three that are likely to impact the smartphone user.*

One of Experian’s predictions is that cyber criminals will move to