720-891-1663

The Weakest Link

According to an article at Cult Of Mac, one of Apple’s suppliers, Quanta, posted Powerpoint documents with instructions on how to log in to a database containing confidential Apple documents on new, yet to be announced products. Apparently, the document contains default credentials, which it says, the business partner should change after they log in […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Guilty Until Proven Innocent – Software Licensing

Lewitt, Hackman, Shapiro, Marshall and Harlan, a law firm based outside Los Angeles, has an interesting take on software licensing.  They don’t say whether they have been representing plaintiffs or defendants in software piracy lawsuits, so I don’t know if there is a bias in their blogging, but it is an interesting point of view. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

First Party vs. Third Party Cyber Liability Insurance

For those of us who are not insurance experts, the distinction may not be obvious.  As explained in more detail here, the difference is in who experiences the loss. First party coverage covers damage to your business such as costs of notifying customers, purchasing credit monitoring services, repairing reputational damage or paying a cyber extortionist. […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Board Of Directors Role In Cyber Security

The National Law Review has a great article on board member’s responsibility in the area of cyber security. One quote from the article: a 2012 Carnegie Mellon poll of how U.S. boards are managing cyber risks found that 71% rarely or never review privacy and security budgets, 80% rarely or never review roles and responsibilities, and nearly […]

Continue reading → [DISPLAY_ACURAX_ICONS]