Blogs
Articles
How Does a Beneficiary Deed Work?
How Does a Beneficiary Deed Work? There never seems to be an easy time to…
Website Accessibility and the Americans with Disabilities Act (ADA)
Website Accessibility and the Americans with Disabilities Act (ADA) Although websites have been held subject…
Teach Your Kids About Cybersecurity During Back to School Season
It's back-to-school season and the Internet has become a part of daily learning for many…
How Cases Relating to the Illinois Biometric Information Privacy Act (BIPA) are Shaping Biometric Privacy in the U.S.
How Cases Relating to the Illinois Biometric Information Privacy Act (BIPA) are Shaping Biometric Privacy…
Why the U.S. is Focused on Increasing its National Cyber Defenses in 2023
Because cyber threats are consistently on the rise, the need for protection is increasing at…
The Federal Trade Commission Proposes a New Rule Banning Noncompete Agreements
Do you utilize noncompete agreements in your business? According to the Federal Trade Commission (FTC),…
Education and How it Impacts Law and Cybersecurity
Some of you may not know that I started my career as an educator –…
Cyber Insurance Coverage Case – Travelers Insurance vs. International Control Services (ICS)
As cyberattacks continue to evolve and grow, it's more important than ever to ensure that…
Looking Back at 2022’s Major Cyber Attacks
Looking Back at 2022's Major Cyber Attacks As we consider how important it is to…
2022 Recap: Changing Regulations, Cybersecurity Developments, & Privacy
As the new year begins and we get back to work, it's time to reflect…
Social Media Cybersecurity for Businesses – How to Defend Against and Recover From Account Hackers
When reviewing your business' cybersecurity measures, don't underestimate the amount of risk that comes with…
How Widespread Fake Reviews are Impacting Businesses and Legal Consequences
How Widespread Fake Reviews are Impacting Businesses and Legal Consequences Fake reviews have become an…