Cybersecurity
13 July 2017

Failure to Enter a HIPAA Business Associate Agr...

For those of you who follow this blog, one thing will become evident over time: one of my co-authors, Tim Gutwald, and I frequently blog about HIPAA-related privacy issues.  That’s because both of our practices include a fair amount of HIPAA work.  And, one tends to write about what they are passionate about (to the […]

CyberSecurity Ransomware
22 June 2017

Low Tech Solutions to Combat the High Tech Cybe...

Imagine that you have twelve (12) hours to pay or your files will be permanently destroyed.  You are the victim of a Ransomware attack. What will you do? Clocks-a-ticking. Ransomware, like WannaCry and CryptoLocker, have proven to be a common, lucrative, low-risk, criminal-enterprise.  Ransomware is a type of malicious software that blocks access to the […]

Cybersecurity Blog Alt Text
15 May 2017

Former FBI Cyber Expert James Trainor Speaks to...

The Economic Club of Grand Rapids hosted a luncheon last Monday, May 8, addressing cybersecurity. Miller Johnson sponsored the event and several members of the Privacy and Cybersecurity team attended to hear the presentation of former FBI cyber expert James Trainor.  During his time at the FBI, Mr. Trainor investigated some of the world’s largest […]

13 April 2017

Welcome to Miller Johnson’s Cybersecurity and P...

Welcome to Miller Johnson’s Cybersecurity and Privacy Blog. The goal of this blog is to help business leaders sleep a little better by sharing insights that help businesses understand and manage today’s cybersecurity risks.