Recent high-profile data breaches highlight the challenges in understanding how laws apply to a wide variety of information management scenarios and a host of other regulatory, compliance and legal issues. Credit: Thinkstock Cybersecurity and privacy continue to make headlines. Experts have more questions than answers addressing risk management concerns in the evolving cybersecurity market. High-profile data breach incidents On March 7, 2017, the CIA got doxed by the anti-secrecy organization WikiLeaks. Nearly 9,000 documents appeared online showing the CIA sought to observe conversations, online browsing habits and other activities by infiltrating the systems that contained them, such as Apple and Android smartphones, laptops, TVs and even cars. The government is not alone. Nearly every industry that handles sensitive data has been breached recently: Healthcare: ransomware attacks are projected to rise 250%, and hackers were responsible for 106 major healthcare data breaches in 2016. Financial services: Despite ranking only third in volume of security incidents, the financial services industry came in first in number of incidents leading to confirmed data losses. Insurance: Risk is twofold in this market, because insurers are not only targets of hackers, they’re also providers of coverage to victims. Education: At the beginning of February 2016, the University of Central Florida announced a data breach had affected approximately 63,000 current and former students, faculty and staff. Third-party vendor risk Third-party vendors remain a growing source of concern. Companies are well-advised to look beyond their own cybersecurity policies and standards to the potentially bigger risk that arises from giving third-party vendors direct access into their systems. Indeed, low-tech threats like errors by vendors’ employees represent an often-overlooked danger to company data security. Newer technology trends such as enterprise-level SaaS provisioning and cloud data storage and processing offer new possibilities and perils alike. Given the inevitability of cybersecurity breaches, companies are increasingly looking to insurers to offset the losses they are likely to face after suffering an attack. However, because the cyber insurance market is young and growing rapidly, the scope and availability of policies is still fluid. Companies should carefully review the specifics and limits of coverage. According to one source, most questions right now are focused on coverage for business interruptions and losses related to fraudulent transactions. Smaller companies may face even bigger challenges. Few small companies have the staff or the resources to actively manage cybersecurity risk, and many assume that their business risks are small. Despite their smaller size, these businesses will incur the same level of breach-related costs as larger companies. Related content opinion Who is winning in text message (SMS) marketing? Recent court decisions provide much needed clarity around issues of u201cconsentu201d so that businesses using text message marketing know when they can rely on the recipientu2019s consent. By David Adler Sep 01, 2017 6 mins Legal Marketing Consumer Electronics opinion Trump's executive order travel ban and IT workers Is there anything tech employers should keep in (or out of) contracts for third-party service providers or temporary tech workers? By David Adler Mar 01, 2017 5 mins H-1B Visas Legal Careers opinion Echo chamber: Amazon device creates new legal privacy twist for smart home systems Given the sensitive nature and legal protections afforded to digital information obtained within the home, should law enforcement have the right to access data gathered by smart home devices? By David Adler Jan 09, 2017 3 mins Internet of Things Privacy Consumer Electronics opinion 5 questions to ask your retail clients about GPS tracking and geolocation Retail tracking generally works by monitoring individuals' movements in or near locations of interest. The specific mechanisms can vary but often involve recording signals emitted by individuals' smartphones, wearables and other wireless ac By David Adler Dec 08, 2016 4 mins Mobile Apps Privacy Consumer Electronics Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe