Closing The Loop

Articles on data breach

A Growing Consensus on Data Breach Litigation?

Data breaches are common and expensive. When a breach is discovered, companies can easily spend millions notifying affected customers, covering credit monitoring and identity theft services, and conducting fore... Casey C. Sullivan   |     17 Aug 2017

Hackers Breach the Wall, Invade Westeros: Why Lawyers Should Pay Attention

The world of “Game of Thrones” has been invaded, pillaged, and laid to waste, but not by any Dothraki invaders, incestuous Lannisters, or Night King. By hackers. Unscrupulous cyberattackers, presumably bearing ... Casey C. Sullivan   |     01 Aug 2017

Wells Fargo’s Discovery Disaster: Bank Accidentally Releases Info on Wealthiest Clients

The discovery process is particularly susceptible to data breaches, as we’ve written once or twice or three times before. Discovery, after all, involves collecting, reviewing, and exchanging extremely high-valu... Casey C. Sullivan   |     25 Jul 2017

Why Lawyers Need to Know About State Data Breach Notice Laws

Hackers are increasingly targeting law firms, viewing them as a “one-stop shop” for sensitive lucrative client data. The examples are many: hackers breaking into M&A firms to steal info for insider trading; Rus... Eric Pesale   |     28 Apr 2017

Fact Sheet: 15 Alarming Statistics about Law Firm Data Security

Law firms are the holders of their clients’ most sensitive data, business secrets and IP. But while some assume they are safe havens for that data, nothing could be further from the truth. Recent high-profile c... Robert Hilson   |     27 Jan 2017

The Downright Terrifying Cost of a Data Breach | Logikcull

Electronic devices and IT systems are the new bank vaults and boardrooms: troves of sensitive information -- from passwords and usernames, to credit card information, business strategies and corporate secrets -... Robert Hilson   |     08 Sep 2016

Schneier on data security: 'We are fragile, we can't recover, we can't adapt.'

Bruce Schneier is a renowned security expert whose accolades we covered in detail in a previous post. In part one of this interview, we posed the question, What do you do if your law firm is the next Ashley Mad... Robert Hilson   |     18 Sep 2015
New Call-to-action

Subscribe To Our Blog

Webinar: How to Avoid eDiscovery Production Disasters

Posts by Topic

Additional Topics >>>

Let us know what you thought about this post.

Put your comment below.