Three major cyber events in 2017 set new precedents for the scope and impact of damage wrought by cyber-attack in terms of geographic and industry reach, operational disruption, and economic losses, as well as the destruction of market capital and reputation. While the concepts of cybersecurity may be foreign for many executives and board members, ...
We have the answers
Search Results
Valentine’s Day is a time when employees celebrate, while HR representatives, in-house counsel, and business owners hold their breath. In this #MeToo era, employers should consider proactively addressing workplace relationships and shoring up internal policies for dealing with complaints. Here are some tools to help employers get in the Valen...
The future. It’s the topic on the mind of most business leaders—what’s going to happen in the future? And importantly, how do you ensure you’re prepared for it? Today, as technological advances impact the scale, scope, and utility of data and information, a new ecosystem of information and trust is taking shape around us. Bu...
Artificial intelligence (AI) is advancing quickly, and it’s impossible for anyone to give a precise vision of how the next ten—much less five—years will unfold. Our aim here is different: to make specific predictions about AI trends for the next 12 months and draw out key implications for business, government, and society as a who...
Although the recent high-profile cases of sexual misconduct make for sensational news stories, how this issue directly affects employers often gets lost in the media chatter. Under current law, employers can be held vicariously liable (i.e. legally responsible) for the harassment of their employees by a supervisor, co-worker or even a vendor or cli...
Most people prefer to age in place. If you have a beautiful and gracious home that you love, why leave it? Yet common features in many homes—steeps stairs, “classic” plumbing fixtures, even hardwood floors—can actually make life less comfortable, or sometimes even dangerous, as you get older. Fortunately, there are many...
Due diligence often focuses heavily on financial and operational issues. Often the new or combined organization’s cybersecurity does not receive the attention it deserves. As a result it places the company at risk from a cyber incident, which can detrimentally impact the organization’s reputation and financial security. The risk is high...
From Anita Hill’s allegations in the 1990s to the recent flood of allegations in the news headlines, sexual harassment has been a persistent and pervasive problem. It occurs at all levels, across all occupations. While many companies have policies addressing inappropriate and unwelcome sexual behavior in the workplace, those policies may not ...
Cyber risk has moved from the IT department to a full-fledged enterprise risk. Unfortunately, a cyberattack can hit a company at any time. There are, however, practical, actionable steps to ensure that when a cyberattack hits, your company and board will be both ready to address the threat and resilient enough to recover from it. Leveraging a flexi...
Collecting art can be a gratifying experience that can take you into an exclusive world of auction houses, galleries and artists’ studios. There’s a lot to learn in the early days of collecting, and most collectors start small. But if you want to elevate your art buying to collecting, it’s necessary to make a mental shift, includi...
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in...
The U.S. Department of State estimates that more than 8,000 Americans die in a foreign country each year. While some of those are permanent residents and long-time expatriates, thousands more are tourists or individuals traveling for business. For families and their enterprises receiving that unexpected news, the first inclination may be panic. Hav...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...