Scarinci Hollenbeck, LLC
The Firm
201-896-4100 info@sh-law.comFirm Insights
Author: Scarinci Hollenbeck, LLC
Date: June 3, 2016
The Firm
201-896-4100 info@sh-law.comComing shortly on the heels of its partnership with the FCC to investigate the security parameters of mobile devices, the event demonstrates new frontiers of cybersecurity issues in the modern economy. Broken into four panels, the event seeks to cover the general concerns of any business operating in the digital space.
Just like corporate culture adapted to the telephone and email, it must adapt to the constraints and concerns of cyber security so that every person working for the company generally understands how to work with security in mind as, more often than not, careless or uninformed employees cause security breaches.
Therefore, the most important concept and policy for any company is establishing a corporate mindset of cyber security. To that end, businesses need to be aware that cyber security has diverged so much from regular IT work that it truly does require another dedicated group to manage.
It will cost more money upfront to integrate another complication into the development process, but it could save more money in the end. Much like builders would rather construct a building right the first time rather than retrofit it, companies should develop and deploy new software with robust cyber security built in.
As a corollary to the second panel, the third focuses on working with third parties. As anyone who has worked with HIPAA knows, this represents a serious problem. Third parties with system access (such as credit companies, software companies, contractors, etc.) can also be an Achilles’ heel to those systems. Even with the best cyber security parameters, if you grant access to a third party with inadequate cyber security, then your company will be exposed. Thus, companies should perform due diligence on any third party wanting system access.
The real problem with cyber security is that the more secure one makes a network the less functionality and ease-of-use that network will possess. So, fundamentally, good cyber security practices are a balancing act between ease-of-use and protection. Finding that equilibrium is unique to each company and needs to be continually assessed to adapt to the rapidly advancing arms races between network attackers and defenders.
Ultimately, the best cyber security practice is having a corporate culture well informed of attacker’s methods and your system’s defenses.
About the Authors:
Fernando M. Pinguelo:
Fernando M. Pinguelo, a trial attorney and Chair of the firm’s Cyber Security & Data Protection and E-Discovery groups, devotes his practice to complex litigation with an emphasis on cyber security, data privacy, media and employment matters. A former prosecutor, Fernando’s experience addresses all facets of litigation (trial, mediation, arbitration, appellate) in both federal and state courts and he regularly handles “crisis litigation,” including emergency applications with the courts. Most recently, the leading global information services company retained him to address data breach incident reportedly involving the theft of 15 million customers’ sensitive data.
Kurt M. Watkins, Co-Author:
Kurt M. Watkins is an associate with the firm. Mr. Watkins focuses his practice on Corporate Structuring and Cyber Security Law. Coming from a technology industry background, he is proficient in computer software and hardware and has a concentration in Intellectual Property.
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]
Author: Jesse M. Dimitro
Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]
Author: Jesse M. Dimitro
Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]
Author: Scarinci Hollenbeck, LLC
Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]
Author: Dan Brecher
What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]
Author: Ronald S. Bienstock
If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]
Author: Patrick T. Conlon
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.
Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.
Coming shortly on the heels of its partnership with the FCC to investigate the security parameters of mobile devices, the event demonstrates new frontiers of cybersecurity issues in the modern economy. Broken into four panels, the event seeks to cover the general concerns of any business operating in the digital space.
Just like corporate culture adapted to the telephone and email, it must adapt to the constraints and concerns of cyber security so that every person working for the company generally understands how to work with security in mind as, more often than not, careless or uninformed employees cause security breaches.
Therefore, the most important concept and policy for any company is establishing a corporate mindset of cyber security. To that end, businesses need to be aware that cyber security has diverged so much from regular IT work that it truly does require another dedicated group to manage.
It will cost more money upfront to integrate another complication into the development process, but it could save more money in the end. Much like builders would rather construct a building right the first time rather than retrofit it, companies should develop and deploy new software with robust cyber security built in.
As a corollary to the second panel, the third focuses on working with third parties. As anyone who has worked with HIPAA knows, this represents a serious problem. Third parties with system access (such as credit companies, software companies, contractors, etc.) can also be an Achilles’ heel to those systems. Even with the best cyber security parameters, if you grant access to a third party with inadequate cyber security, then your company will be exposed. Thus, companies should perform due diligence on any third party wanting system access.
The real problem with cyber security is that the more secure one makes a network the less functionality and ease-of-use that network will possess. So, fundamentally, good cyber security practices are a balancing act between ease-of-use and protection. Finding that equilibrium is unique to each company and needs to be continually assessed to adapt to the rapidly advancing arms races between network attackers and defenders.
Ultimately, the best cyber security practice is having a corporate culture well informed of attacker’s methods and your system’s defenses.
About the Authors:
Fernando M. Pinguelo:
Fernando M. Pinguelo, a trial attorney and Chair of the firm’s Cyber Security & Data Protection and E-Discovery groups, devotes his practice to complex litigation with an emphasis on cyber security, data privacy, media and employment matters. A former prosecutor, Fernando’s experience addresses all facets of litigation (trial, mediation, arbitration, appellate) in both federal and state courts and he regularly handles “crisis litigation,” including emergency applications with the courts. Most recently, the leading global information services company retained him to address data breach incident reportedly involving the theft of 15 million customers’ sensitive data.
Kurt M. Watkins, Co-Author:
Kurt M. Watkins is an associate with the firm. Mr. Watkins focuses his practice on Corporate Structuring and Cyber Security Law. Coming from a technology industry background, he is proficient in computer software and hardware and has a concentration in Intellectual Property.
Let`s get in touch!
Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!