How to Create Your Cyber-Incident Response Plan

Read the full article (PDF) >

You keep hearing it— it is not a matter of whether a cyber-security incident will hit your company, but when. An incident can include a number of events, such as suspicious network activity; theft or loss of physical assets like laptops, phones, or thumb drives; malware; credit card theft; phishing attempts; ransomware; or website defacement. Are you ready for any of these? Does your company have a response plan? Is it written down? Are others aware of it? Has it been tested?

First published on InsideCounsel, July 25, 2016

The articles on our Website include some of the publications and papers authored by our attorneys, both before and after they joined our firm. The content of these articles should not be taken as legal advice.