360 Central Ave., 8th Floor, St. Petersburg, FL 33701
Search
Facebook Twitter LinkedIn Client Portal
Nelson Cyber Law, PLLC

Call today for a FREE 30 minute consultation

1-800-440-5536

Subscribe to this list via RSS Blog posts tagged in cyber crime

Florida cybersecurity attorneyTo understand why you might need a cyber law attorney now or in the future, take a quick look back. Twenty years ago, were you worried about losing control of your intellectual property because of Etsy or Amazon, or of losing control of your website domain name to a web jacker?

Shift in Transactions From People to Web Impacts Cyberlaw

Have you noticed how many business transactions have shifted from being personal-relationship-driven to being mostly or entirely web-driven? Consider all of these situations where, 20 years ago, you would have insisted on doing business one-on-one, face-to-face, but today you can - and often prefer to - conduct most of this business over the internet:

  • Making a big-ticket purchase like a computer, car, or house;
  • Working with a tax accountant, financial advisor, lender, or lawyer; and
  • Working with a writer, graphic designer, or another provider of marketing or creative services.

Shift in Documentation from Paper to Digital Requires Cyberlaw

Years back, most businesses relied on an exchange of paper documents. While paper documents could be photocopied, they could not be widely disseminated without significant cost and typically did not travel far. Today, we rely much more heavily on electronic document exchanges, and it is far too easy for such documents to be intercepted by hackers, copied, slightly altered, and widely disseminated around the globe very quickly.

...

Tampa cyber law attorney cyber attack damagesCyber threats are a serious and growing risk for American and global businesses. A 2017 study by the Ponemon Institute and Accenture, based on data from over 250 large companies across seven countries, reported an average of 130 security breaches per company in 2017, a 27% increase over the prior year. Ransomware attacks are a particular concern, and the reported frequency of these attacks doubled from 2016 to 2017.

Computer system hackers may be aiming to steal trade secrets, obtain personal data that can be used for identity theft, or simply cause trouble for a business out of spite. Whatever the motive, any type of security breach can cost a business thousands or even millions of dollars in system repair costs and loss of revenue.

Cyber Damages Claims Under Federal and Florida State Law

...

Posted on in Cyber Crime

b2ap3_thumbnail_shutterstock_356278754.jpgComputer hacking continues to attract a great deal of attention from those charged with keeping company networks safe. However, in May of last year, a computer virus began infecting networks around the world. The never-before-seen malware was disrupting service in the healthcare, automobile manufacturing, telecom and worldwide shipping industries, among others, around the world. While the virus wreaked havoc across the globe, it took but a single computer expert to shut down the spread and potentially save companies billions of dollars.

Anonymous Hacker Hero

In May of 2018, a young man known only by his Twitter handle, “Malware Tech,” was able to do what IT professionals at some of the world’s largest businesses were unable to accomplish. With a few simple keystrokes, he was able to shut down one of the world’s largest cyber-attacks to ever occur.

...

Posted on in Cyber Crime

b2ap3_thumbnail_shutterstock_302508602.jpgBusinesses of all sizes dedicate considerable resources every year to develop, secure and defend their computer network. Software companies constantly introduce new firewalls and other anti-virus programs to fight off illegal breaches. Despite best efforts, network hacking continues making headlines and compromising sensitive information.

Giving In To Hackers’ Demands

In what has become a widely publicized case of hacking, that seems to feature the release of new details on what feels like a weekly basis, ride-sharing giant Uber acknowledged that it paid hackers $100,000 to delete the data they stole in 2016. The personal information of nearly 57 million Uber drivers and riders was accessed illegally by two, yet-to-be-identified electronic thieves.

...

Posted on in Cyber Crime

b2ap3_thumbnail_Untitled-design-22.jpgEven when you take proactive steps to protect your company’s network and stored data, there are individuals constantly looking for opportunities to expose and exploit any weaknesses. Hacking is a major issue facing companies and, if the news is any indication, electronic thieves and computer hackers are showing no signs of reducing their illegal and damaging activities.

Companies are Being Hit by Hackers

There have been a number of high-profile hacking incidents that made the news over the past few years that impacted major retailers and financial institutions, as well as their customers and clients. The latest company to fall victim was the ride-sharing business, Uber.

...

Posted on in Cyber Crime

Florida cyber crime and hacking attorneyThe term “hacking” conjures images of illegal activities by highly-motivated cyber criminals looking to steal and exploit vast amounts of business and personal information. However, as the internet changes and laws evolve to keep pace with the rapid growth of cyber activity, the federal government has begun considering ways by which companies might use hacking to their advantage.

Hacking to Combat Hacking

Until recently, a business’s only defense against a cyber attack or hacking might be the installation of updated firewalls or software to combat electronic intrusions. However, it seemed that as soon as new defensive software was created, hackers were finding and exploiting inherent weaknesses or developing techniques to subvert network protection.

...

St. Petersburg cyber law attorney cyber crime legislationWhen the digital age took hold in America, and an increasing number of businesses began conducting trade online, it became necessary to protect commerce, transactions, and other online activity from illegal access and fraud. The Computer Fraud and Abuse Act (CFAA) is a federal anti-hacking law that was passed in 1986, and is now the subject of updates in order to keep up with the constantly evolving digital world.

Why the CFAA Needs Updating

In its current form, the CFAA does not allow a business to go beyond its own network to fight or protect against cyber attacks, such as the installation of malware. While the CFAA was expanded upon in 1996, proponents of this newest legislation do not believe the existing language goes far enough in allowing businesses to protect their digital property.

...

Florida cyber security attorney data breachWhen credit reporting giant Equifax announced that millions of consumer records were exposed to hackers by means of a data breach, it was just the latest in the series of recent commercial cyber attacks which have impacted millions of people. Perhaps the primary takeaway from this news is that if this type of breach can happen to a company as large as Equifax, it can happen to any company that maintains digital business and client records.

How Can a Business Protect Company and Client Data?

By most accounts, the breach at Equifax was due to complacency in addressing a software flaw in the company’s website involving a tool which consumers used to contact the company and address issues with their credit reports. Every company should be aware that hackers will seek to expose any flaw in your company’s software or website protocol.

...

Posted on in Cyber Crime

b2ap3_thumbnail_domain-name-dispute.jpgJust as one’s company name and logo are vigorously protected against misuse and infringement, a business must remain equally vigilant to ensure its online identity is not stolen. Speedy resolution of Internet domain disputes allows a business to continue its e-commerce efforts while cracking down on those who might try to benefit from unscrupulous or even illegal use of a company’s domain.

Obtain a Strong Domain Name

Perhaps the best way to avoid domain disputes altogether would be to obtain, properly register, and monitor with vigilance your domain and online presence. This was considered much easier when the Internet hosted only generic top-level domains such as .com and country codes, but with the introduction of .net, .org, .info, and other domain names, monitoring domain names requires a renewed effort. Here are some steps for finding and establishing a strong domain name:

...
Back to Top