BusinessInsurance.com reported the comments of Paul Meeusen, head of distributed ledger technology at Swiss Re Ltd. in Zurich that using Blockchain to manage Insurance “seemed very intuitive that this technology was very suitable to some of the key issues we deal with in our industry.” The December 12, 2017 article entitled “Insurance well suited to blockchain, speakers say” was on a New York City Bar Association panel discussion including these comments from Nick Williams (Clifford Chance LLP, Senior Partner): I think insurance is the perfect industry for blockchain, Accuracy in pricing will increase as (distributed ledger technology) platforms increase the transparency of risk. View Full Post
Unitrends issued a white paper which stated that “the truth is that all industries are vulnerable to ransomware. Email, databases and business applications run on similar infrastructure and operating systems across all industries.”  The white paper was entitled “Beat Ransomware in 5 Easy Steps, Be Prepared to Fight or Be Prepared to Pay” included these comments about Step 3 to Test, Test and Test Again: Even the FBI agrees that the only truly effective way to combat ransomware is to regularly back up data and verify the integrity of those backups. View Full Post
The New York Times reported that Mecklenburg County, North Carolina (which includes the city of Charlotte) refused to “pay a $23,000 ransom to a group of hackers who seized control of several government computer systems” and the County was operating without “the internet, civil servants were doing their jobs using “paper processes.””  The December 6, 2017 report entitled “North Carolina County Refuses to Pay $23,000 Ransom to Hackers” included these comments: Officials said they believed the hackers had not obtained the personal information of any employees or private citizens. View Full Post
One might conclude it makes a lot sense to insure business data after considering Tableau’s report that included Ponemon’s estimate that the “average total cost of a data breach was estimated at $3.62 million.”  The December 2017 report entitled “2018 Top 10 Business Intelligence Trends” included the #5 Rise of the Chief Data Officer (CDO) The fact that CDO’s and/or CAO’s are being appointed and assigned accountability for business impact and improved outcomes, also demonstrates the strategic value of data and analytics in modern organizations. View Full Post
The New York Times reported that Uber fired it security officer after “two hackers stole data about the company’s riders and drivers — including phone numbers, email addresses and names — from a third-party server and then approached Uber and demanded $100,000 to delete their copy of the data.” The November 21, 2017 report entitled “Uber Hid 2016 Breach, Paying Hackers to Delete Stolen Data” included these details about how Uber reacted to the hackers: The company tracked down the hackers and pushed them to sign nondisclosure agreements, according to the people familiar with the matter. View Full Post
It’s the End of Authentication (of ESI) as We Know It Amendments to Federal Rules of Evidence 803 and 902 will become effective on Dec. 1 and will “govern in all proceedings thereafter commenced and, insofar as just, all proceedings then pending.” We previously analyzed the changes to the hearsay exception for ancient documents (FRE 803(16)), and here focus on amendments concerning the self-authentication of evidence generated by electronic processes or systems (FRE 902(13)) and self-authentication of data copied from an electronic device, storage medium or file (902(14)). View Full Post
On November 29th the US Supreme Court will consider the case of US v. Carpenter where “police acquired the data from Carpenter’s wireless carriers without a warrant showing probable cause”  which led to Timothy Carpenter’s conviction that he was  “leading a gang of robbers” and the “prosecution produced cellphone-tower data that tracked the whereabouts of Carpenter’s cellphone for more than four months and placed him at or near the sites of a string of armed robberies.” View Full Post
If Evidence in its Original Form Is No Longer Available – But a Copy of that Evidence Is – Are Spoliation Sanctions Appropriate? In Barcroft Media, Ltd. et al. v. Coed Media Grp., LLC, No. 16-CV-7634 (JMF) (S.D.N.Y. Sept. 28, 2017), Plaintiffs – providers of entertainment-related photojournalism and owners of celebrity photographs – interposed various intellectual property claims against Defendant Coed Media Group, LLC (“CMG”).  View Full Post
Among a number of recommendations to avoid Spearphishing (aka Business Email Compromise – BEC) the FBI recommends that “employees to use two-factor authentication to access corporate e-mail accounts.” The November 14, 2017 FBI News Report entitled “FBI Tech Tuesday—Digital Defense Against Business E-mail Compromises” included this advice about training employees to: watch for suspicious requests, such as a change in a vendor’s payment location avoid clicking on links or attachments from unknown senders. View Full Post
Darkreading reported that every “business with BYOD and corporate mobile device users across the globe has been exposed to mobile malware.”  The November 17, 2017 report entitled “Mobile Malware Incidents Hit 100% of Businesses” included these comments: …BYOD devices are usually more susceptible to attack than corporate devices because they are not managed by such security measures as an enterprise mobility management platform or mobile threat management platform. View Full Post