Data breaches come in many different forms, sizes, and levels of complexity, but they tend to share certain key facts: A third-party bad actor—whether through a phishing attack, a ransomware attack, exploitation of a zero-day vulnerability, or other means—gains access to a company’s information technology systems. Following execution of the company’s incident response plan, forensic analysis determines that customer, patient or other personal data was actually or potentially accessed or…
By: Davis Wright Tremaine LLP
By: Davis Wright Tremaine LLP