Close

Cybersecurity & Data Privacy

Updated:

Corporate Transparency Act Enjoined Again

On December 26, 2024, the U.S. Fifth Circuit Court of Appeals vacated its own order staying the nationwide preliminary injunction of the enforcement of the Corporate Transparency Act (“CTA”) and its reporting deadlines. As it gets closer to the initial deadline of January 1, 2025, the Court has been going…

Updated:

Remote Work and Cybersecurity: Keeping Law Firm Data Safe Beyond the Office

With the rise of hybrid and remote work in the legal industry, the challenge of securing sensitive client data has grown exponentially. Law firms must grapple with ensuring data protection across varied locations and through potentially vulnerable networks. Protecting data is not only a matter of compliance but also central…

Updated:

3 Simple Steps Addressing Cybersecurity for Commercial Real Estate

As technology associated with commercial real estate has evolved, landlords are confronted with conundrum: How to use new technologies to modernize buildings and increase profitability by attracting high quality tenants through maximizing tenant experience, while addressing the cybersecurity threats that accompany these new technologies? The exact problem will differ based…

Updated:

‘Cyber Security Best Practices During the Covid-19 Pandemic’ Webinar Presented by Eric B. Levine for The Suburban Chamber of Commerce

This webinar addresses best practices to protect yourself virtually during the coronavirus pandemic. Presented by Eric Levine, Executive Vice President of Lindabury, McCormick, Estabrook, & Cooper and Co-Chair of the firm’s Cybersecurity and Data Privacy practice, this virtual presentation was hosted by The Suburban Chamber of Commerce. Mr. Levine works…

Updated:

6 Tips for Every Business Dealing with Remote Access and Teleworking Employees

By the time you are reading this guidance, your business has likely been operating under a shelter in place order or perhaps even a governmental quarantine in response to the Coronavirus pandemic, and your staff has been operating remotely for an extended period.  While it may be too soon to…

Updated:

As Coronavirus Spreads, Some Firms May Struggle to Pivot to Remote Work

Eric Levine,  Cybersecurity & Data Privacy co-chair of Lindabury, McCormick, Estabrook & Cooper,  was quoted by Legaltech news, in a recent article concerning the coronavirus’ impact on law firms.  Eric says “the firm is proactively reminding the firm’s lawyers and staff to remain vigilant against coronavirus-related phishing emails. “From a…

Updated:

Why Bring Lawyers In? – Attorney-Client Privilege Can Be Crucial for Businesses’ Protection

Robert Anderson, a shareholder at Lindabury, McCormick, Estabrook & Cooper and a member of the firm’s Cybersecurity & Data Privacy practice group was recently questioned by Tom Hughes of ROI-NJ, regarding the reasons a business should consult an attorney to oversee cybersecurity planning and preparation.  In short; the answer is:…

Updated:

Eric Levine Quoted in NJBIZ – “Show Me the Money: How to Counter the Growing Threat from Digital Con Artists”

Eric Levine, co-chair of Lindabury’s Cybersecurity and Data Privacy practice is quoted in a recent issue of NJBIZ regarding the growing digital threat often disguised as a legitimate-looking email.  Eric says that when our firm receives an email in regards to a bank transaction, “We won’t cut a check against…

Updated:

Experts Warn of Cyber Attacks on Smart Cities and Buildings

Eric Levine, co-chair of Lindabury’s Cybersecurity & Data Privacy practice group spoke recently to attendees during NAIOP New Jersey’s final installment of their “Future Proof Your Buildings” series. Coverage of the event by Real Estate Weekly was recently published providing highlights and strategies for ensuring security of smart cities throughout…

Updated:

How Cybersecurity Training Protects Your Organization Even After a Breach

Eric Levine and Robert Anderson co-authored the recently published article in Training Industry addressing the need of businesses to assess their own cybersecurity risks and openly exchange internal information to effectively address and mitigate an actual breach situation. Yet a company’s internal assessments of its own weaknesses and the holes in…