Scarinci Hollenbeck, LLC
The Firm
201-896-4100 info@sh-law.comFirm Insights
Author: Scarinci Hollenbeck, LLC
Date: August 3, 2020
The Firm
201-896-4100 info@sh-law.comTwitter recently suffered a high-profile cyberattack that compromised the accounts of some of its most famous users, including Barack Obama, Elon Musk, Bill Gates, and Kanye West. While the hackers only got away with $120,000 in Bitcoin, Twitter is facing intense scrutiny over it’s the effectiveness of its data security safeguards.

According to media reports, hackers were able to obtain an employee’s account information and credentials which they used to gain access to an internal Twitter dashboard. These hackers then used Twitter’s internal administrative tool to lay siege of individual user accounts and perpetrate a Bitcoin scam. The “weak link” in Twitter’s cybersecurity model was none other than its own employee.
Twitter isn’t the first (and won’t be the last) company to suffer a data breach at the hands of an unwitting employee. As companies increase their cybersecurity protection algorithms, hackers are turning to social engineering to sidestep those controls.
The term “social engineering” refers to the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. For example, rather than attempting to exploit a software’s vulnerability, hackers will send an email to an employee that purports to be, for instance, from the IT department to trick the employee into providing his password.
In most cases, employees who expose company data actually believe they are doing their job. “People inherently want to be helpful and therefore are easily duped,” said Kevin Mitnick, one of the country’s most notorious hackers. “They assume a level of trust in order to avoid conflict.”
Social engineering attacks have been on the rise in recent years. An estimated 62 percent of businesses experienced phishing and social engineering attacks in 2018. While social engineering schemes can take a variety of forms, phishing attacks are among the most common. As we have discussed in prior articles, phishing scams use email or malicious websites to solicit sensitive information by posing as a trustworthy source, i.e. fellow employee, business partners, vendor, etc. For example, an attacker may send an email seemingly from your company’s financial institution that requests account information, often suggesting that there is a problem. Hackers can then use the information provided to gain access to the accounts.
With so many employees working remotely, COVID-19 is providing fertile ground for cyberattacks. The key to avoiding a social engineering attack is to train employees to never disseminate sensitive information unless they are certain of the identity of the requesting party and confirm that the requesting party should be given access to the information sought. Below are several specific tips from the Cybersecurity and Infrastructure Security Agency (CISA) to help build proper awareness amongst your employees:
Twitter’s much-publicized hack highlights that data breaches can cause significant reputational harm, particularly if the public perceives that the threat could have been easily thwarted. Employees are vulnerable to social engineering hacks, even at the most tech-savvy companies. With workers increasingly working remotely and conducting business via email, it is imperative that they are trained to safeguard sensitive business data.
If you have any questions or if you would like to discuss the matter further, please contact me, Maryam Meseha, or the Scarinci Hollenbeck attorney with whom you work, at 201-896-4100.
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Non-disclosure agreements (NDAs) remain a critical tool for protecting sensitive business information. However, New York NDA requirements have evolved, and businesses must ensure these agreements are carefully drafted to remain enforceable. In a competitive market like New York City, NDAs are commonly used to protect proprietary information, client relationships, and strategic plans. At the same […]
Author: Dan Brecher

How Courts Evaluate Testamentary Capacity and Undue Influence Will contests in New Jersey are difficult to win, given the strong presumption that a properly executed will reflects the testator’s intent. However, challenges based on lack of testamentary capacity and undue influence remain common, particularly where there are concerns about mental capacity or the involvement of […]
Author: Marc J. Comer

Bringing on outside investors can provide the capital and strategic support a business needs to grow. However, raising capital also introduces important legal, financial, and operational considerations. Before bringing on investors, businesses should address key legal issues to reduce risk, streamline investor due diligence, and position the company for long-term success. Early preparation signals that […]
Author: Dan Brecher

How the Updated Law Shapes Retirement and Estate Planning The SECURE 2.0 Act of 2022 materially reshapes the required minimum distribution (RMD) landscape, extending tax deferral opportunities while accelerating distribution requirements for many beneficiaries. For high-net-worth individuals and families, these changes are not merely technical. They require a reassessment of retirement income strategies, beneficiary planning, […]
Author: Marc J. Comer

Small businesses considering buying commercial property in New Jersey must evaluate a range of legal, financial, and operational factors. While ownership can offer long-term value and control, it also introduces significant risks if not properly structured. This guide outlines key considerations to help New Jersey business owners make informed decisions, minimize legal exposure, and successfully […]
Author: Robert L. Baker, Jr.

On January 28, 2026, staff of the U.S. Securities and Exchange Commission’s Divisions of Corporation Finance, Investment Management, and Trading and Markets issued a joint statement clarifying how existing federal securities laws apply to tokenized securities. The SEC’s “Statement on Tokenized Securities” does not establish new law, but it does provide greater clarity on the […]
Author: Dan Brecher
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.
Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.
Let`s get in touch!
Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!