Resources

Client Alerts, News Articles, Blog Posts, & Multimedia

Everything you need to know about BMD and the industry.

FTC Increases Targeting of Companies Lacking Cyber Protection

Client Alert

Here is how businesses can develop cyber strategies to mitigate breaches and financial risk.

The Federal Trade Commission (FTC) recently released a comprehensive cybersecurity report outlining key findings and recommendations based on emerging threats, trends in data breaches, and strategies for businesses to enhance their cybersecurity posture observed over the last year. The FTC strives to protect consumer privacy and respond to the evolving ways that companies use consumer data such as in the development of artificial intelligence models and misuse of health data. 

Importantly, the report emphasized the need for proactive measures to mitigate risks and highlighted the FTC’s initiative in targeting companies that fail to implement reasonable data security measures to protect consumer data. 

Here are some key strategies for businesses: 

  1. Risk Assessment and Management: Conduct regular risk assessments (at least annually) to identify potential vulnerabilities and prioritize them based on their potential impact on the business. Develop and implement a risk management plan to address these vulnerabilities effectively.
  2. Cyber Security Policies and Procedures:  Implement basic cybersecurity policies to protect its assets, data, and operations from cyber threats.
  3. Employee Training and Awareness: Educate employees about cybersecurity best practices, such as recognizing phishing emails, using strong passwords, and reporting suspicious activity. Regular training exercises help reinforce awareness.
  4. Access Control and Privilege Management: Implement strong access controls to limit user privileges and restrict access to sensitive data and systems. Use multi-factor authentication (MFA) where possible to add an extra layer of security.
  5. Data Encryption: Encrypt sensitive data to protect it from unauthorized access. 
  6. Patching: Keep software and systems up to date with the latest security patches to address known vulnerabilities. Establish a patch management process to ensure timely deployment of patches across the organization.
  7. Network Security: Deploy firewalls, intrusion detection/prevention systems, and other network security measures to monitor and protect against unauthorized access and malicious activity. Segment networks to limit the spread of potential breaches.
  8. Incident Response Plan: Develop a comprehensive incident response plan that outlines procedures for detecting, containing, and mitigating cybersecurity incidents. Test the plan regularly through tabletop exercises and simulations.
  9. Vendor Risk Management: Assess the security practices of third-party vendors and service providers to ensure they meet your organization's security standards. Include contractual clauses that outline security requirements and responsibilities.
  10. 10. Cyber Insurance: Consider obtaining cyber insurance to mitigate financial risks associated with cybersecurity incidents, such as data breaches or business interruptions.

By adopting a proactive approach to cybersecurity and implementing these strategies, businesses can enhance their cybersecurity posture and better protect themselves against evolving threats and complying with ever increasing legal obligations.  

BMD assists companies design and implement a strategy to achieve technical and organizational controls to bolster cybersecurity and data protection.  

If you have any questions regarding this topic and how to protect your company's data, please contact BMD Member Brandon Pauley at btpauley@bmdllc.com.


First-of-Its-Kind Federal Ruling Finds Use of Consumer AI Tool May Destroy Attorney-Client Privilege

On February 10, 2026, Judge Jed Rakoff of the U.S. District Court for the Southern District of New York issued a first-of-its-kind ruling finding that documents generated by a criminal defendant using a consumer AI platform were not protected by attorney-client privilege after being shared with counsel. The court treated the AI tool as a third party, concluding that entering sensitive information into a publicly available platform may waive confidentiality. The ruling also suggests that the work product doctrine may not apply where AI-generated materials are created independently by a client rather than at counsel’s direction. The decision signals that parties should exercise caution when using consumer AI tools in connection with legal matters.

Your Golden Chance for H-1B Lottery Registration - March 2026

USCIS H-1B registration opens March 4–19, 2026. U.S.-based employees on valid nonimmigrant status are exempt from the $100,000 fee for change of status petitions. The new weighted lottery favors higher-skilled and higher-paid employees, improving odds for advanced degree holders and Wage Level 3 or 4 workers.

Invisible Algorithms: The Hidden Role of Artificial Intelligence in USCIS Immigration Processing

The Department of Homeland Security has confirmed that artificial intelligence and machine learning tools are now integrated into numerous operational functions within U.S. Citizenship and Immigration Services (USCIS). These tools are described as mechanisms to improve efficiency, reduce backlogs, and assist officers in managing an unprecedented volume of applications. DHS emphasizes that human adjudicators retain decision-making authority and that AI systems do not independently grant or deny immigration benefits. Find out how AI affects the U.S. immigration process.

OAAPN | Year In Review: 2026 Ohio Board of Nursing and Ohio Law Rules

Find out key changes to Ohio law and the Ohio Board of Nursing rules that have directly impacted APRN practice over the past year, including Psychiatric Inpatient Documents, Intimate Examinations, Signature Authority, Duties Related to Fetal Death, Retail IV Therapy Clinics, Release from Permanent Restrictions, Disciplinary Action, Course on Drugs and Prescriptive Authority, Overdose Reversal Drugs, Office Based Opioid Treatment, Withdrawal Management for Substance Use Disorder, Safe Haven Program, and more.

Ohio House Bill 537: Proposed Regulations for Midwives and Birthing Centers

House Bill 537, introduced in the Ohio House of Representatives, proposes a comprehensive regulatory framework for certified nurse-midwives, certified midwives, licensed midwives, and traditional midwives. The legislation would clarify scope of practice, establish licensure standards, and impose new requirements for freestanding birthing centers and home births. Healthcare providers and facilities should be aware of the proposed changes and their potential operational impact.