About Mark Spitz

This author has not yet filled in any details.
So far Mark Spitz has created 36 blog entries.

Equifax Data Breach

Small and mid-sized businesses worried after recent Equifax data breach

By now, almost everyone has heard or read about the recent data breach of Equifax, one of the three large credit reporting companies in the U.S. According to Equifax, as many as 143 million consumer records were compromised, with the potential for identity theft and other fraudulent actions.

Companies of all sizes […]

By | 2017-10-02T19:42:25+00:00 October 2nd, 2017|

Equifax Data Breach

Equifax data breach: consumers and companies at risk

By now almost everyone has read or heard about the massive data breach at Equifax, one of the three large credit reporting companies.  According to news reports, 143 million Americans have had sensitive personal information, including names, addresses, social security numbers, and birthdates stolen.  This information enables a criminal to steal the identity […]

By | 2017-10-04T17:06:06+00:00 September 20th, 2017|

HIPAA Security Rule

How to protect patient information against cyberattacks and data breaches:  requirements under the Health Insurance Portability and Accountability Act (HIPAA)

For nearly 15 years, HIPAA’s Privacy and Security Rules have governed the handling and transmission of protected health information, or “PHI”. The Privacy Rule governs how PHI may be used and disclosed, while the Security Rule sets out the steps that […]

By | 2017-09-05T15:57:21+00:00 August 31st, 2017|

FTC settles with tax preparation company

Federal Trade Commission settles with tax preparation company over violations of privacy and security requirements that apply to all tax preparers

I have written in previous posts that the Gramm-Leach-Bliley statute, which many believe only applies to “financial institutions”, also applies to accountants who prepare tax returns for clients.  This statute, which has been around for over 15 years, requires […]

By | 2017-09-05T16:20:49+00:00 August 29th, 2017|

Outside General Counsel

What is an “outside general counsel” and what can one do for your company, besides save you money?

Do you wish you could run legal and business issues past your lawyer whenever you need to, without worrying about getting billed for every call or email?  Having a trusted business attorney can be a great benefit to any business. He or she […]

By | 2017-08-29T15:08:19+00:00 August 14th, 2017|

Denver Bar Cybersecurity Article

Denver Bar Association’s magazine The Docket: article on cybersecurity

Please check out my article on cybersecurity in the August/September issue of The Docket, the Denver Bar Association’s magazine.  Click here for the link.  Please feel free to contact me at 720-575-0440 or mark@spitzlegalcounsel.com if you have any questions about your company’s cybersecurity, and I can […]

By | 2017-08-29T15:18:23+00:00 August 8th, 2017|

Accounting firms: protect client data

Accounting firms must take steps to protect client data

Accountants and accounting firms are at increasing risk of cyberattacks.  Just earlier this year, two small accounting firms in Massachusetts reported being hacked, resulting in the theft of more than 6,000 clients’ data.  Why do hackers target accounting firms, especially smaller ones? The client information that these firms have includes names, social […]

By | 2017-08-29T15:20:49+00:00 July 24th, 2017|

How to prevent Ransomware

Ransomware is a growing threat: what it is, what it can do, and how to prevent it

Click here to see my recent article on ransomware in ColoradoBiz’s online magazine, discussing how companies can protect themselves against the increase in ransomware cyberattacks. There are steps you can take today to lower the risk of an attack. […]

By | 2017-10-04T16:49:41+00:00 June 12th, 2017|

Hackers Using Social Media Posts

Hackers Using Social Media Posts To Steal Data

By now nearly everyone has heard about the recent “WannaCry” ransomware attack, which affected thousands of computers in over 100 countries. While this attack came in through a vulnerability in Microsoft Windows operating systems that had not been updated, most ransomware is the result of “phishing.”  Phishing, sometimes called “spear-phishing,” occurs when someone […]

By | 2017-10-04T16:51:39+00:00 May 31st, 2017|

New type of ransomware hacking

Ransomware Hacking Tactic

Ransomware, which can freeze up your company’s entire computer network, has been on the rise in recent years. Ransomware often takes the form of an email that seems legitimate, with an attachment in a format such as MS Word or Excel. If the recipient clicks on the attachment, it releases the malicious software into your computer network, freezing […]

By | 2017-10-04T16:53:06+00:00 May 8th, 2017|
Load More Posts