News & Resources

Cyber vulnerability testing and risk assessment services surrounding IoT cyber risk, business unit realignment, network asset inventory, and more, as well as security training and education.

Cybercriminals steal billions of dollars from small businesses every year, and one of their favorite methods is the business email compromise (BEC), a sophisticated way to divert funds from legitimate business-to-business transfers. A Common Example ...

This seminar, focused on practice management land mines in small and mid-sized law firms and how to circumvent them, will feature three segments. Presentations and speakers will include: Management “Land Mine” #1: Workplace Security  Management ...

On Cozen O’Connor’s Cyber Law Monitor podcast, host Andrew Baer is joined by Matthew Klahre from Cozen O’Connor’s Technology, Privacy & Data Security practice group for a discussion, with practical tips, on how to manage internal and ...