
Internet


Cyber Liability Insurance
The increased reports of cyber-attacks, either for ransom or other mischief, induced many insurance companies to offer cyber liability insurance policies to protect businesses from liability as result of unauthorized hacks or information disclosures, and some even...
Offboarding and the Threat to Your Business
One of the greatest threats to your business’ electronic data is not closing the door when offboarding employees, contractors or third parties. Not terminating their access may expose your business to hacking, phishing, ransom attacks and other cyber threats. Your...
Protecting Business Information with Employees at Home
The COVID-19 pandemic and the sudden increase of the number of employees working at home puts even more pressure on your business to protect its proprietary, confidential and trade secret information. Some concerns you should address to protect confidential...
Preventing Cyber Attacks
Cyberattacks, hacking, data theft, ransom demands and other intrusions into your data storage and operating systems can cripple or ruin your business. Experts report that the threat increases yearly, and even more with increased reliance on third-party contractors and...
Confidential Information with Employees at Home
The Covid-19 pandemic and the sudden increase of the number of employees working at home puts even more pressure on your business to protect its proprietary, confidential and trade secret information. Some concerns you should address to protect confidential...It’s no April Fool’s joke, Brooks, Tarulis & Tibble launched its new website
Welcome to our new website. It provides easier access to our attorneys, practice areas, recent successes and our ongoing law blog that contains insights on current legal, business and personal issues that we think can be valuable to our clients and friends. We have...Stopping Business Identity Theft
While personal identity theft has garnered a lot of attention, there has been little attention about business identity theft, yet the harm can be substantial. Identity thieves pray on small businesses that may not adequately protect their business and financial...
Cyber Theft Red Flags
Cyber thieves now pray on persons and businesses that send and receive money via wire transfers. Typically the thieves hack into the files of one or more of the parties to the transaction and when alerted to the scheduling of the closing send false wire instructions...
Data and Privacy Protection
The new frontier for business liability may be the failure to adequately protect non-public personal information (“NPPI”). New federal and state laws, as well as agency regulations and industry standards, address not only the collection, protection and use of NPPI,...
Your Digital Estate
With the increasing use of various electronic media to store documents, pictures and personal information; access and maintain accounts; and conduct transactions, it is increasingly important to protect and plan for the use and ownership of your digital estate and...