News & Analysis as of

Email Cyber Crimes Risk Management

Bradley Arant Boult Cummings LLP

Business Email Compromise: The Most Prevalent – and Preventable – Cyber Risk

Ransomware attacks that shut business down to zero and data breaches that disclose the personal information of customers, vendors and employees justifiably strike fear in the hearts of executives everywhere. Organizations can...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Warns of Tricky O365 Phishing Attack

If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more

K2 Integrity

Targeted Cyber Frauds in Today’s Global Crisis

K2 Integrity on

You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more

Robinson+Cole Data Privacy + Security Insider

Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion

Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in 2021 will fall victim to a ransomware attack every 11 seconds, down from every 14 seconds in...more

Robinson+Cole Data Privacy + Security Insider

Iranian Cyber-Attacks and the End of Support for Windows 7 and Windows Server 2008

After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more

King & Spalding

AI Driven "Deepfakes" Expose Holes in Corporate Compliance Programs: The Road to Recovery

King & Spalding on

Artificial intelligence (“AI”) has made astounding advancements in recent years. Driven by incredible computing power, AI has the potential to change nearly every industry. AI is touted as having the potential to reduce...more

Holland & Hart LLP

3 Tips to Protect Real Estate Agents & Firms from Cybercrime

Holland & Hart LLP on

Did you know Americans lost nearly $150 million dollars to real estate internet scams last year? That makes real estate cyber crime a greater risk to Americans than identity theft ($100 million in losses) or credit card fraud...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Dorsey & Whitney LLP

SEC Report on Internal Controls, Cyber-security

Dorsey & Whitney LLP on

Cyber-security has become – or perhaps should be – a key area of concern for every enterprise. The risks are substantial for the firm, its shareholders, executives and customers as recent cases illustrate....more

Brownstein Hyatt Farber Schreck

SEC Cautions That Cyber-Related Fraud Could Evidence Failed Internal Accounting Controls

On Oct. 16, 2018, the Securities and Exchange Commission (the “SEC”) released a cautionary report discussing whether certain public companies that had become victims of cyber-related fraud may have violated federal securities...more

A&O Shearman

Can a Cyber Breach Be a Violation of Internal Controls? The SEC Says, ‘Maybe’

A&O Shearman on

On October 16, 2018, the Securities and Exchange Commission (SEC) issued a report outlining an investigation conducted by the SEC’s Division of Enforcement related to the internal accounting controls at nine public companies...more

Foley & Lardner LLP

Strategies for Protecting Against Vendor Payment Fraud

Foley & Lardner LLP on

Cybercrime is an ever-increasing threat from which manufacturers are not immune. Although reliable statistics are not available, one particular type of scheme that seems to be on the rise is vendor payment fraud. In cases of...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #155 - Home Buyers Tricked Out of Down Payments by Scammers

An old trick is coming back and working. It is a wire fraud scheme targeted at homeowners instead of businesses, and it is happening at an alarming rate....more

K2 Integrity

Too Good to Be True: Cyber Safety Tips

K2 Integrity on

When seasoned investigators are exposed to online scams, the protective warnings they give to others on social media safety and internet fraud suddenly become real. Read on to see how one of our own dodged an online rental...more

Burr & Forman

Best Practices to Detect and Prevent File-Less and Click-Less Malware

Burr & Forman on

Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity controls, hackers will typically look for an easier target or they will...more

Womble Bond Dickinson

Small and Mid-Sized Companies are the New Targets of Business Email Compromise

Womble Bond Dickinson on

Originally published in the Upstate Business Journal on February 15, 2018. Meet Peter — a longtime employee and the backbone of your business’s day-to-day finance and accounting operations. Today he got an email from the...more

K2 Integrity

Protecting Your Digital Assets

K2 Integrity on

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

Shutts & Bowen LLP

A real estate broker’s guide to avoid being a victim of cyber fraud

Shutts & Bowen LLP on

The headline’s become all too familiar: “Cyber thief hacks real estate broker’s email, steals retired couple’s nest egg,” or something similar. The past few years have seen a dramatic increase in such incidents, with the FBI...more

Dickinson Wright

Phishing Lures: What To Do If You’ve Taken The Bait - U.S. Version

Dickinson Wright on

Sometimes, it’s easy to know you’re being phished. There’s little chance that a bank administrator in a country you’ve never heard of really needs your help to get the unclaimed money of a deceased, rich foreigner out of the...more

Burr & Forman

WannaCry Ransomware – What You Need to Know

Burr & Forman on

Starting on Friday, May 12th , computers in countries around the world have fallen victim to the latest ransomware attack. As of Monday morning, it is estimated that more than 150 countries have infected systems, totaling...more

K2 Integrity

WannaCry Ransomware Update

K2 Integrity on

On Saturday May 13, 2017 the Federal Bureau of Investigations (FBI), Cyber Division, in conjunction with the Department of Homeland Security issued an FBI FLASH report pertaining to indicators associated with the latest...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Patterson Belknap Webb & Tyler LLP

Asset Protection Wake Up Call: Data Security Top Concern for High Net Worth Investors

A recent study asked high net worth investors which of the following issues they were most concerned about: terrorism, data security, or a major illness. The most prevalent response might surprise you. Seventy-two percent...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide