By Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how companies operate. It seems to be business as usual, as your hospitality company continues to collect, use and transmit large amounts of sensitive data to operate the business. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse ...
By: Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how companies operate. It seems to be business as usual, as your hospitality company continues to collect, use and transmit large amounts of sensitive data to operate the business. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse ...
Blog Editors
Recent Updates
- Watch: Words Matter - How to Draft Arbitration Agreements That Hold Up in Court - Employment Law This Week
- One Nation, One Privacy Law: GOP Introduces Federal Privacy Legislation
- DOL Proposes New Safe Harbor for Selection of Designated Investment Alternatives for Defined Contribution Plans
- Watch: Joint Employment, Misclassification, I-9s, and Web Accessibility - New Rules and Rulings Reshape Employer Risk - Employment Law This Week
- Critical Infrastructure at Risk: Project Glasswing Urges Attention to AI-Driven Cyber-Risks