News & Resources
Cyber vulnerability testing and risk assessment services surrounding IoT cyber risk, business unit realignment, network asset inventory, and more, as well as security training and education.

Building a staffing model that brings a part or full-time crisis planning position into the K-12 organizational structure will better protect schools. “As schools across the country continue to struggle with increased threats of violence, ...
School leadership is inundated with responsibilities and projects during the school year and is often pressed to find significant blocks of time it can devote exclusively to school safety. Yet, as schools continue to face ...
We’re proud to share that on July 19, 2023, the Secure Community Network announced three new members to its National Security Advisory Council (NSAC), including our Director of K-12 Services, Robert Evans. The Secure Community Network (SCN), ...
While technology is growing ever more sophisticated, the basic human emotions of greed, fear, curiosity, loneliness, helpfulness, and group solidarity stay the same over millennia. These emotions leave us vulnerable to manipulation. Indeed, we’ve been ...
Workplace violence has been on the rise in recent years. This trend reflects both a more violent society generally and the unique disruptions created by the COVID-19 pandemic. Many organizations are facing novel security challenges ...
Since 2014, the American workforce has experienced over a million violent crimes every year. Per the Department of Labor Statistics, in 2020 alone, more than 20,000 workers in private industry were subjected to assault resulting ...
Today, Cozen O’Connor announces a transition for two of its ancillary businesses, Margolis Healy and Associates and COSECURE. For decades, Margolis Healy has been a market leader specializing in safety, security, emergency preparedness, and regulatory compliance for communities ...
Recently, we have seen a rise in the hacking and fraudulent exploitation of HR data. In particular, the personally identifiable information (PII) of employees, stored by HR, has become a frequent target of cybercrime. While ...
Cybercriminals steal billions of dollars from small businesses every year, and one of their favorite methods is the business email compromise (BEC), a sophisticated way to divert funds from legitimate business-to-business transfers. A Common Example ...
This seminar, focused on practice management land mines in small and mid-sized law firms and how to circumvent them, will feature three segments. Presentations and speakers will include: Management “Land Mine” #1: Workplace Security Management ...
On Cozen O’Connor’s Cyber Law Monitor podcast, host Andrew Baer is joined by Matthew Klahre from Cozen O’Connor’s Technology, Privacy & Data Security practice group for a discussion, with practical tips, on how to manage internal and ...