Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Data Breach Can Be Prepared For And Stopped When it Comes Your Business

Author: Scarinci Hollenbeck, LLC

Date: May 22, 2013

Key Contacts

Back

Last month, Associated Press’ Twitter account fell victim a data breach after hackers sent a fake tweet from their account referencing an explosion at the White House.

The tweet caused the Dow Jones Industrial Average to plunge more than 100 points within seconds.

This latest incident highlights not only how disruptive a  data breach can be, but also how easily they can be orchestrated. The attack has been linked to an ongoing spear phishing scheme that targets Twitter users’ corporate email accounts.

Despite these high profile attacks, a recent report by the Ponemon Institute and Experian Data Breach Resolution suggests that many companies still have significant gaps in their data security procedures.

The study, which surveyed 471 compliance, privacy, and IT personnel at U.S. companies, identified the following practices as creating the potential for a significant data breach:

  • BYOD is permitted without security testing. Seventy-eight percent say their organizations allow employees to bring their own mobile devices such as laptops, tablets and smart phones (BYOD) to the workplace. However, 61 percent say their organization does not require or they are unsure that mobile devices should be tested for security prior to connecting to networks or enterprise systems.
  • Lack of effective access and authentication practices could enable improper access to personal information. Less than half (44 percent) of respondents say that their organization is effective in authenticating and making sure that only the appropriate employees and contractors have access to its information systems. Moreover, only 43 percent say their organization promptly changes access rights of employees and contractors when they change jobs or are terminated.
  • Encryption is not widely deployed. Less than one-third of respondents say sensitive or confidential personal and business information stored on computers, servers and other storage devices generally encrypted.
  • Monitoring information systems for unusual or anomalous traffic does not regularly occur. Only one-third of respondents say their organizations are taking such preventative measures as monitoring for potential risks to the network and enterprise system.

As we have previously highlighted on this Business Law Blog and on our companion blog eWhite House Watch, effective data security policies and procedures are essential for businesses of all sizes. Failing to have the proper protections in place will not only hurt your company’s reputation, but also may impact your bottom line.

If you have any questions about this study or would like assistance with your data theft prevention efforts, please contact me, Fernando Pinguelo,  or the Scarinci Hollenbeck attorney with whom you work.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
New York NDA Requirements for Businesses post image

New York NDA Requirements for Businesses

Non-disclosure agreements (NDAs) remain a critical tool for protecting sensitive business information. However, New York NDA requirements have evolved, and businesses must ensure these agreements are carefully drafted to remain enforceable. In a competitive market like New York City, NDAs are commonly used to protect proprietary information, client relationships, and strategic plans. At the same […]

Author: Dan Brecher

Link to post with title - "New York NDA Requirements for Businesses"
New Jersey Will Contest Grounds Explained post image

New Jersey Will Contest Grounds Explained

How Courts Evaluate Testamentary Capacity and Undue Influence Will contests in New Jersey are difficult to win, given the strong presumption that a properly executed will reflects the testator’s intent. However, challenges based on lack of testamentary capacity and undue influence remain common, particularly where there are concerns about mental capacity or the involvement of […]

Author: Marc J. Comer

Link to post with title - "New Jersey Will Contest Grounds Explained"
Legal Issues Before Bringing on Investors post image

Legal Issues Before Bringing on Investors

Bringing on outside investors can provide the capital and strategic support a business needs to grow. However, raising capital also introduces important legal, financial, and operational considerations. Before bringing on investors, businesses should address key legal issues to reduce risk, streamline investor due diligence, and position the company for long-term success. Early preparation signals that […]

Author: Dan Brecher

Link to post with title - "Legal Issues Before Bringing on Investors"
SECURE 2.0 RMD Planning Strategies post image

SECURE 2.0 RMD Planning Strategies

How the Updated Law Shapes Retirement and Estate Planning The SECURE 2.0 Act of 2022 materially reshapes the required minimum distribution (RMD) landscape, extending tax deferral opportunities while accelerating distribution requirements for many beneficiaries. For high-net-worth individuals and families, these changes are not merely technical. They require a reassessment of retirement income strategies, beneficiary planning, […]

Author: Marc J. Comer

Link to post with title - "SECURE 2.0 RMD Planning Strategies"
Buying Commercial Property in New Jersey: Legal Guide for Small Businesses post image

Buying Commercial Property in New Jersey: Legal Guide for Small Businesses

Small businesses considering buying commercial property in New Jersey must evaluate a range of legal, financial, and operational factors. While ownership can offer long-term value and control, it also introduces significant risks if not properly structured. This guide outlines key considerations to help New Jersey business owners make informed decisions, minimize legal exposure, and successfully […]

Author: Robert L. Baker, Jr.

Link to post with title - "Buying Commercial Property in New Jersey: Legal Guide for Small Businesses"
The SEC’s Latest Guidance on Applying Federal Securities Laws to Tokenized Securities post image

The SEC’s Latest Guidance on Applying Federal Securities Laws to Tokenized Securities

On January 28, 2026, staff of the U.S. Securities and Exchange Commission’s Divisions of Corporation Finance, Investment Management, and Trading and Markets issued a joint statement clarifying how existing federal securities laws apply to tokenized securities. The SEC’s “Statement on Tokenized Securities” does not establish new law, but it does provide greater clarity on the […]

Author: Dan Brecher

Link to post with title - "The SEC’s Latest Guidance on Applying Federal Securities Laws to Tokenized Securities"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!