Acomodating information security in our business
Kahn has been an expert witness in major court cases on information-related issues. Brock is an associate consulting intern with Kahn Consulting, Inc.
The following month, it was “Petya,” another massive cyberattack that crisscrossed the globe, bringing Russian oil companies, Ukrainian banks and a mass of multi-national corporations to their collective knees. Companies are exposed to an endless assault on their information technology (IT) infrastructure from a variety of anonymous hackers, ranging from mischievous (much less likely) to felonious (much more likely).
Translating legal language into a technical reality is complex, differs from technology to technology, and again demands that lawyers, privacy, and IT professionals cooperate to better translate the law into a technical reality.
Whether moving undetected within a storage environment, hacking a military facility, stealing product design drawings, or holding information hostage through various Ransomware scams, we are entering the new era of information terrorism.
Vigilance in combating information terrorism is essential.
As the frequency of cyberattacks reach epidemic proportion . Breaking into servers, computers, and Cloud providers in an attempt to steal valuable information has become mainstream in the last decade.