Blog

Between the Lines Blog

Data Security Threats to Consider While Employees are Working Remotely
Category: Coronavirus (COVID-19), Information Security & Privacy
COVID-19 has thrown many businesses into the fire of remote working. Morphisec reported in its Work-from-Home (WFH) Employee Cybersecurity Threat Index that remote working was an entirely new experience for 49 percent of employees, and 25 percent of employees working from home aren’t familiar with…
Read Full Post »
Cybersecurity Enforcement Deadlines in the Wake of COVID-19
Category: Coronavirus (COVID-19), Information Security & Privacy
While some regulations have been relaxed a bit to provide flexibility during shelter-in-place or other restrictive measures, one area that is generally not slowing down is privacy and cybersecurity. The past few years have seen a rollout of new privacy and cybersecurity measures at the state…
Read Full Post »
So What's All This About Zoom?
Category: Coronavirus (COVID-19), Information Security & Privacy
For the time being, many Americans are at home due to the COVID-19 virus, but they are continuing to work, learning to homeschool and socializing with friends thanks to virtual platforms. Although there are a variety of applications and platforms, Zoom has landed on top and is quickly becoming a…
Read Full Post »
Location, Location, Location: What Will Your Personal Data Reveal Besides Whether or Not You #StayHome?
Category: Coronavirus (COVID-19), Information Security & Privacy
As more and more Americans are learning the ins and outs of Zoom, receiving baptisms by fire in the world of homeschooling or simply catching the latest episode of "Tiger King," we are now on more screens than ever. Inevitably, more screen time leads to more social media and online surfing. Last…
Read Full Post »
Cybersecurity in the Time of COVID-19
Category: Coronavirus (COVID-19), Information Security & Privacy
As the COVID-19 pandemic continues, hackers continue to target workers’ increased dependence on digital tools. Online activities have become the most effective channel for human interaction and continued operations. In current circumstances, a cyberattack removing a household or business’s ability…
Read Full Post »
< Newer Page 1/2 Older >

View All Posts

View By Category

Archive

The Between the Lines blog is made available by Mitchell Williams Law Firm and the law firm publisher. The blog site is for educational purposes only, as well as to give general information and a general understanding of the law. This blog is not intended to provide specific legal advice. Use of this blog site does not create an attorney client relationship between you and Mitchell Williams or the blog site publisher. The Between the Lines blog site should not be used as a substitute for legal advice from a licensed professional attorney in your state.