5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
Most professionals are aware of the April 15 tax deadline. We know that fraudsters certainly are! As Tax Day approaches in the U.S., we encourage all to be mindful of several phishing campaigns that Microsoft has observed...more
Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more
On October 16, the New York Department of Financial Services (DFS) issued a circular letter addressing cybersecurity risks related to the increasing use of artificial intelligence (AI) in relation to insurers, insurance...more
"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more
The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more
In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more
We often remind our clients about the importance of taking cybersecurity measures. In response, we frequently hear the question, “How can I suffer a cyber loss if I don’t have custody of the funds?”...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw...more
Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more
This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more
The Massachusetts State Police Commonwealth Fusion Center (CFC) believes that cyber actors may use the current bank failures for future phishing and business email compromise (BEC) attacks. Cyber actors often use current...more
The Nigerian prince seems almost quaint. Gone are the days when the Nigerian prince was the only nefarious figure menacing our inboxes. A simple yet elegant scheme – our supposed prince unexpectedly fell upon a large sum...more
Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more
Whether you are the CEO of a big corporation working in the office six days a week or an analyst working remotely from home entering data, everyone is at risk of a cyber-attack. Despite the fact that all organizations,...more
Internet users have (mostly) learned to avoid scams by supposed Nigerian princes looking to share a vast inheritance, and there has been a rise in awareness of other common signs of phishing attempts, such as poor spelling...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more
Risk Management Question - How can employees mitigate the risk of falling for phishing scams purportedly sent by their company's HR department? The Issue - Scammers often know just the right thing to say to pique an...more
Cybercriminals exploited remote work during the COVID-19 pandemic. In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more
According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more
If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more