Resources

Client Alerts, News Articles, Blog Posts, & Multimedia

Everything you need to know about BMD and the industry.

The Rising Threat from Insiders – Get Your House in Order

Client Alert

What is Insider Threat?

As its name implies, an ‘Insider Threat’ originates inside an organization. An ‘insider’ is any person who has or had authorized access to or knowledge of an organization’s resources, including personnel, facilities, information, equipment, networks, and systems. ‘Insider threat’ can manifest from malicious, complacent, negligent or unintentional acts that negatively affect the integrity, confidentiality, and availability of the organization, its data, personnel, or facilities. Certainly, ‘Insider Threat’ can be an activity by a bad actor employee, but can also arise from an inadvertent or unknowing action inside an organization (such as an employee who unintentionally opens a phishing email or clicks on a malicious link).

Rising Frequency; Rising Costs.

Protecting against ‘Insider Threat’ is a data security concern for all organizations. The realities facing organizations today include:

  • The frequency and cost of preventing insider attacks is rising;
  • User negligence is the most common cause of a data breach; and
  • Insider threat deterrence must become a key element in a cybersecurity posture.

According to a 2020 study[1], the average global cost of ​insider threats​ rose by ​31% in two years and the frequency of these incidents spiked by ​47%​ in the same time period. The risk is also present for small and medium sized businesses (SMBs). While 72% of organizations reported an increase in insider attacks in 2020, 66% of key decision makers in SMBs do not think breaches are likely to occur. Only 14% of SMBs have any kind of breach defenses in place; the rest are vulnerable to potentially devastating cyberattacks[2]. While daunting, the reality of modern business dictates that companies of all sizes, in all industries, must be cognizant of cybersecurity issues and prepare accordingly.

How can your company guard against Insider Threat?

The following is a brief list of action items your company should implement to address ‘Insider Threat’:

  • Put it in writing – An organization’s security policy should include procedures to prevent and detect misuse of company resources, guidelines for conducting insider investigations, and the potential consequences to the individual. Written policies not only preserve continuity, but also clearly outline rules and expectations in the organization.
  • Train and educate – The Identity Management Institute states that employee education remains key to breach prevention, including cybersecurity awareness during onboarding and routine drills to practice attack and breach responses.
  • Dictate Acceptable Use – An organization should detail an organization’s rules and expectations regarding technology use. This includes considering acceptable behavior on networks and devices.
  • Be transparent about employee privacy expectations - Organizations need to balance reducing insider threats and protecting employee privacy. Communicate and educate employees regarding the security policy and IT rules. Explain the program's objectives, while training employees about their role in security.
  • Get Technical – Invest in IT and consult with legal and technical cybersecurity professionals to find a solution that works for your organization.

Prudent businesses will create and maintain written policies as it relates to cybersecurity and data protection. BMD can assist in crafting the policies and identifying proper security frameworks and connecting you with technical experts to implement. 

If you have any questions about whether your cybersecurity risks, and whether your business is protected, please contact BMD’s Cybersecurity Practice Leaders, Brandon Pauley at btpauley@bmdllc.com or Kyle Johnson at kajohnson@bmdllc.com.

[1] https://www.proofpoint.com/uk/resources/threat-reports/2020-cost-of-insider-threats and Cybersecurity Insiders’ 2020 Insider Threat Report.

[2] https://identitymanagementinstitute.org/government-cybersecurity-and-insider-threats/


Department of Education Proposes Redefinition of “Professional Degree,” Excluding Nursing and Limiting Graduate Loan Borrowing

The U.S. Department of Education has issued a Notice of Proposed Rulemaking that would redefine “professional degree” programs under the One Big Beautiful Bill Act. The proposal excludes nursing from the recognized list and would impose new borrowing limits for graduate students while eliminating the Grad PLUS program. Public comments are due by March 2, 2026.

First-of-Its-Kind Federal Ruling Finds Use of Consumer AI Tool May Destroy Attorney-Client Privilege

On February 10, 2026, Judge Jed Rakoff of the U.S. District Court for the Southern District of New York issued a first-of-its-kind ruling finding that documents generated by a criminal defendant using a consumer AI platform were not protected by attorney-client privilege after being shared with counsel. The court treated the AI tool as a third party, concluding that entering sensitive information into a publicly available platform may waive confidentiality. The ruling also suggests that the work product doctrine may not apply where AI-generated materials are created independently by a client rather than at counsel’s direction. The decision signals that parties should exercise caution when using consumer AI tools in connection with legal matters.

Your Golden Chance for H-1B Lottery Registration - March 2026

USCIS H-1B registration opens March 4–19, 2026. U.S.-based employees on valid nonimmigrant status are exempt from the $100,000 fee for change of status petitions. The new weighted lottery favors higher-skilled and higher-paid employees, improving odds for advanced degree holders and Wage Level 3 or 4 workers.

Invisible Algorithms: The Hidden Role of Artificial Intelligence in USCIS Immigration Processing

The Department of Homeland Security has confirmed that artificial intelligence and machine learning tools are now integrated into numerous operational functions within U.S. Citizenship and Immigration Services (USCIS). These tools are described as mechanisms to improve efficiency, reduce backlogs, and assist officers in managing an unprecedented volume of applications. DHS emphasizes that human adjudicators retain decision-making authority and that AI systems do not independently grant or deny immigration benefits. Find out how AI affects the U.S. immigration process.

OAAPN | Year In Review: 2026 Ohio Board of Nursing and Ohio Law Rules

Find out key changes to Ohio law and the Ohio Board of Nursing rules that have directly impacted APRN practice over the past year, including Psychiatric Inpatient Documents, Intimate Examinations, Signature Authority, Duties Related to Fetal Death, Retail IV Therapy Clinics, Release from Permanent Restrictions, Disciplinary Action, Course on Drugs and Prescriptive Authority, Overdose Reversal Drugs, Office Based Opioid Treatment, Withdrawal Management for Substance Use Disorder, Safe Haven Program, and more.