As the coronavirus (“COVID-19”) causes countless companies and employers to implement remote working environments, millions of Americans will be working from home.  It is, therefore, critically important to remain vigilant about cybersecurity best practices.

As observed in recent news alerts, cybersecurity threats, perpetuated by opportunistic cyber-criminals preying on a vulnerable virtual workforce, are on the

Have you ever been involved in a meet and confer regarding electronically stored information and felt your adversary was speaking a foreign language?  Is active machine learning an unfamiliar concept to you?  Is BYOD an acronym for who-knows-what?

If you answered yes to any of the above, or if you lack fluency in the language

With the ever evolving cyber threats, it is important to we understand our social media accounts and the way in which they make us vulnerable.

Social media (i.e., Facebook, Instagram, WhatsApp, Snapchat…) is free to members because the companies make money by selling targeted advertisements to their users.  Ever wonder why, after “liking” a particular

Cybersecurity remains a real concern for businesses and individuals alike.  We are reminded of this by a recent Department of Homeland Security (“DHS”) warning wherein the DHS indicates there will likely be an increase in cyber threats due to heightened tensions with Iran.  In addition to advising that we should be prepared for increased phishing

Data destruction is the process of removing information in a way that renders it unreadable (paper) or irretrievable (digital data). And, while it is critically important for companies to manage data in a way that is effective, defensible, and efficient, people/companies are often hesitant to dispose of data.  The cause of the hesitance is varied: 

In my search for ESI-centric information that would pique my readers’ interest, I came across an interesting article/blog about digital privacy written by Thorin Klosowski, in which he details seven (i.e., one per day) simple ways to secure your digital life.*  Because I found the plan easy to implement and steeped in wisdom, I decided

Although there are data breach notification laws on the books in 48 States that require companies to inform consumers about potential breaches, companies are loathe to make such disclosures.  In fact, a data breach disclosure opens the door to litigation, invites scrutiny from investors and the consuming public, and hardly bodes well for a company’s

Technology has revolutionized, among other things, the way people conduct business, store information and communicate with others.  And, despite the many efficiencies and benefits of technology, a downside of this “revolution” is the creation of countless files that may later be subject to review and potential production during litigation /investigation proceedings.  Indeed, even relatively small