Procuring IoT: Data Integrity and Security

The Internet of Things (IoT) is undoubtedly going to play a major role in the workplace.  Because an employer has a number of critical employee-related interests in securing IoT data, including protecting securing otherwise private employee and business information as well as protecting trade secrets, employment lawyers should be in the conversation with the technology acquisition and development teams as they develop an IoT acquisition policy.  Here is how to create such a policy.

Continue reading “Procuring IoT: Data Integrity and Security”

Employee Terminations: Handle with Care

Employee terminations – whether voluntary or not – must be handled properly in order to ensure optimal risk management.  Employment lawyers cannot leave the technology-related aspects of a termination to others.

Continue reading “Employee Terminations: Handle with Care”

Compromised by Insiders

“Your organization is and will be compromised by insiders…”

Continue reading “Compromised by Insiders”

Proactive Privacy

Employment lawyers should look beyond mere compliance with privacy regulation and engage in what I call “Proactive Privacy.”

Proactive Privacy is creating a privacy-aware corporate culture that educates all employees about privacy (and cybersecurity) and motivates them to be a part of that culture.  In short, it extends your privacy demands beyond the punitive and into the normative. (Of course, clear policies and expectations remain critical!).

Continue reading “Proactive Privacy”

7 Network Security Essentials

What things would you do today to secure your network?  The answers are myriad, but I would suggest these seven things:

Continue reading “7 Network Security Essentials”

8 Cyber Risk Assessment Frameworks

Understanding how to assess cyber risk is essential for a lawyer leading or participating in an enterprise-level cyber risk management team.  One or more of these eight analytical frameworks should help.

Continue reading “8 Cyber Risk Assessment Frameworks”

What the Lenovo Malware Debacle Means

As has been widely reported, Lenovo had shipped consumer laptops with software on it that made it vulnerable to a so-called man-in-the-middle attack, namely, the software intercepted inbound web data, decrypted it, inserted advertising, recoded it, issued a new security certificate (based on a pre-installed “root” certificate) and then sent it along to the browser which accepted the data as trusted.   It works with outbound data, too.  Equally bad, because the makers of the malware were sloppy (and why wouldn’t they be?) they used the same certificate on many machines, used a weakly encrypted certificate and used a password that was easily guessable (not cracked, guessed).  This created ready-made entrance for other attackers to insert themselves as a person-in-the-middle and compromise every transaction.

The upshot?  The user of an infected machine can have zero confidence that the websites they go to (banks, corporate, etc) are real. Security experts warn that no web-based transaction from an infected machine can be deemed to be secure.

Continue reading “What the Lenovo Malware Debacle Means”

Lessons from the Anthem Breach

The Anthem breach reported late last week provides a number of insights:

  1. While Anthem’s transmissions were encrypted, their stored data was not.   It is worth examining whether the efficiencies gleaned from non-encrypted storage are outweighed by the costs of breach recovery, notification and damage to reputation.

Continue reading “Lessons from the Anthem Breach”

Quick Take: FTC’s New Report on the Internet of Things

From the FTC’s new report on the Internet of Things [pdf]:

IoT presents a variety of potential security risks that could be exploited to harm consumers by: (1) enabling unauthorized access and misuse of personal information; (2) facilitating attacks on other systems; and (3) creating risks to personal safety. …[P] rivacy risks may flow from the collection of personal information, habits, locations, and physical conditions over time… companies might use this data to make credit, insurance, and employment decisions.

Overall recommendations:

Continue reading “Quick Take: FTC’s New Report on the Internet of Things”