Scarinci Hollenbeck, LLC
The Firm
201-896-4100 info@sh-law.comFirm Insights
Author: Scarinci Hollenbeck, LLC
Date: May 5, 2016
The Firm
201-896-4100 info@sh-law.comThis is particularly true now that more and more devices are able to access a company’s network, which has pushed Cybersecurity to the forefront of priorities for a business. In fact, according to IBM Corp. Chairman, President and CEO Ginni Rometty at the IBM Security Summit last year, the problem is even bigger than many companies think.

“We believe that data is the phenomenon of our time,” Rometti argued. “It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.”
Last year, Lloyd’s, the British insurance giant, released a report cited by Cyber Insurance magazine that cyberattacks cost businesses up to $400 billion per year. According to Forbes contributor Steve Morgan, many media outlets project that number to hit as high as $500 billion annually.
A Juniper report supported these findings by illustrating that cyber crimes quadrupled from 2013 to 2015. This is a trend that is expected to continue because by 2019 there will be four times as many cyberattacks expected to hit companies globally. As a result of rapid digitization of enterprise records and consumer data, Juniper research projects more than $2 trillion worth of damage to businesses worldwide.
What is clear is that as technology continues to evolve and be adopted by the business world, the potential cost of cyber crimes will grow with it. To prevent and mitigate the damage caused by cyberattacks, the State of New Jersey and the federal government have passed legislation to come down harder on cyber crimes.
However, that is only half the battle businesses face in preventing theft of data and online IDs, unlawful access and data harvesting, illegal account entry and hijacking, fraud, cyberterrorism, illegal downloading and file sharing, email account intrusions and various cyber crimes. All affected parties – to include consumers, financial institutions, regulators and the government – need to prioritize cybersecurity in order to create a safer environment.
That’s why listed below are some ways that small and mid-size businesses can ramp up their cybersecurity efforts.
Cybersecurity preparedness starts with collective accountability. This involves understanding the vulnerabilities – internal and external – that may adversely affect a business. It also means that businesses need to know how hackers can potentially gain entry into their systems and what types of threats they face. That can include everything from phishing, spoofing, social engineering, malware, systems hacking, pharming and an endless number of other threats. Most importantly, though, it is crucial that businesses keep their technology, software and antivirus security applications up to date.
Defining and implementing cybersecurity protocols is one thing, but employees must adhere to the policies. Furthermore, every process and decision needs to be affected by these policies so that it is as much of a priority as business development, R&D and customer service. These cybersecurity policies are a value-add for small to mid-size businesses because it is a selling point of their strategies and operations.
As such, it is necessary for employers to provide everything from education on safe practices and responses, to using unique passwords and encryption codes to protect their proprietary data.
Any type of transaction should be completed and verified over the phone, according to Forbes contributor Frank Sorrentino. The verification of financial requests is necessary to confirm exact details involved in a customer, vendor employee or bank transaction. This process simply adds a layer of protection onto data governance practices.
These plans should be treated as emergency response plans like a fire drill. Response is as important as detection with cybersecurity protocols. All employees need to be well-versed in executing these plans down to the most minute details after a cyberbreach.
As cyber crimes continue to evolve, protection and preparedness are paramount. Businesses, especially smaller companies, need to ensure that their cybersecurity protocols will improve their abilities to combat mounting threats.
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

While the New York City real estate market can be extremely competitive, moving too quickly often backfires. Before purchasing a condominium or cooperative in New York City, it is important to do you homework. Purchasing property in NYC can involve a dizzying number of legal issues. These include condo and co-op rules, rent restrictions, and […]
Author: Jesse M. Dimitro

Smart contracts feature a unique blend of legal agreement and technical code. This innovation has the potential to reshape how business is conducted. At the same time, smart contract legal issues around enforceability, jurisdiction, identity, and compliance are common. The legal framework for these self-executing agreements is still evolving. What Are Smart Contracts? Smart contracts, […]
Author: Bryce S. Robins

Retaining top talent continues to be one of the greatest challenges facing employers today. Even in an employer’s market, the loss of a key employee can disrupt operations and result in significant costs. While compensation plays a role, long-term retention often depends on workplace culture, communication, and employee engagement. One increasingly popular strategy for improving […]
Author: Angela A. Turiano

Secured transactions form the backbone of a wide range of business dealings, including business loans, mortgages, and inventory financing. Because the stakes are often high and relatively minor oversights can have drastic consequences, lenders and borrowers should thoroughly understand how to form an enforceable security agreement that protects their legal rights. What Is a Secured […]
Author: Dan Brecher

Cashing a check marked “paid in full” can be a risky endeavor, particularly if you don’t fully understanding the legal implications. If you are owed more than the amount of the check you accept and deposit, you may waive your right to collect the full disputed amount. That is why you should consider either rejecting […]
Author: Dan Brecher

The One Big Beautiful Bill Act of 2025 (OBBBA) significantly impacts federal taxes, credits, and deductions. A key change relating to Qualified Small Business Stock (QSBS) allows greater tax-free gains for investments in startups and other qualifying small businesses. Company founders and other investors should understand how the enhanced tax strategy works or risk missing […]
Author: Dan Brecher
No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.
Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.
Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.
Let`s get in touch!
Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!