Phishing Attacks More Successful on Mobile
Viewing an entire email in a standard window on a desktop can make it fairly easy to figure out if an email you received is legitimate. You can easily see the sender address, all signatures…
Read Moreabout Phishing Attacks More Successful on Mobile
Who’s Behind Data Breaches?
When you’re implementing data breach and cyber attack protections, you’re probably thinking about agents from the outside trying to hack your system and expose your company’s sensitive data. But those are not the only people…
Read Moreabout Who’s Behind Data Breaches?
How Internal Employees Cause Data Breaches
While the popular image of a cyber attack is from someone from the outside, more than a third of data breaches involve an internal actor. Misuse of existing privileges by these internal actors often are…
Read Moreabout How Internal Employees Cause Data Breaches
NYC Law Firm Releases 2019 Fiduciary Guide
It is hard for a fiduciary to determine what exactly would be a breach of their fiduciary duty to a retirement plan. That is where New York based law firm Cohen & Buckmann, P.C.’s 2019…
Read Moreabout NYC Law Firm Releases 2019 Fiduciary Guide
The Different Types of Data Breaches
The popular image of a data breach is a hacker in his mother’s basement breaking into the mainframe and stealing everything they want. But data breaches very rarely happen in that manner. Cyber criminals keep…
Read Moreabout The Different Types of Data Breaches
Nearly Half of New Jersey Accounts Hacked in 2017
New Jersey’s population is currently just under nine million. Over four million New Jersey accounts were affected by data and security breaches in 2017. How can you protect yourself? There are some simple steps a…
Read Moreabout Nearly Half of New Jersey Accounts Hacked in 2017
Cyber Security for Investment Advisors
Even if you are a small plan advisor, you have to realize that cyber attackers are always attempting to breach and steal your data. It may not be within what you expected when you started…
Read Moreabout Cyber Security for Investment Advisors
Microsoft Emails Hacked in Breach
Some of Microsoft’s email services, which include Outlook, MSN, and Hotmail, were breached by hackers with users’ email addresses, folder names, email subject lines, and names of email addresses users communicated with between January and…
Read Moreabout Microsoft Emails Hacked in Breach
The Fiduciary Duty of Protecting Against Cyber Attacks
Under ERISA, fiduciaries are subject to the prudent expert standard of care, in which they have to act with diligence, care, and skill under the circumstances as professionals their field would. They also owe a…
Read Moreabout The Fiduciary Duty of Protecting Against Cyber Attacks