Two-factor authentication is one of the most common measures that companies use to reduce cyber risk, but it is not very effective if companies don’t also have a good lost-phone protocol.
Ms. Adler is an associate in Davis Polk's Litigation Department. [Full Bio]
Some of the most significant recent cyber breaches originated at vendors. We have previously discussed the importance of effective oversight of third parties because vendor breaches can lead to regulatory actions for companies. Indeed, recent regulatory guidance provides that vendor diligence is an essential part of any cybersecurity program. This…