News & Analysis as of

Email Data Protection Hackers

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Bass, Berry & Sims PLC

Privacy Peril:Chatty Cathy

Bass, Berry & Sims PLC on

We are all increasingly familiar with, and probably increasingly frustrated by, the use of chatbots to attempt to solve some problem we are having with a company, often delivery of a purchased item. The “virtual agent” (not...more

Bass, Berry & Sims PLC

Privacy Peril: New Invoice – Action Required!

Bass, Berry & Sims PLC on

According to Microsoft, 91% of cyberattacks start with an email. In an earlier Privacy Peril we provided information on prevalent words phishers of men and women insert in an email subject line to grab the recipient’s...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #263 – Fake Emails and Texts Spoofing UPS and FedEx

Cyber criminals are taking advantage of the increase in online holiday shopping due to the pandemic. They know people are buying gifts online and sending the packages to the recipients. Often, the recipients do not know they...more

Bass, Berry & Sims PLC

Privacy Perils: Beware Brand Phishing

Bass, Berry & Sims PLC on

We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more

McAfee & Taft

Beware of phishing schemes relating to aviation escrow matters

McAfee & Taft on

The McAfee & Taft Aviation Group has recently seen an increase in the number of phishing schemes relating to aviation escrow matters. Phishing is the fraudulent attempt to obtain sensitive information or data, such as...more

TransPerfect Legal

Cybersecurity and Arbitration: Protecting Your Documents and Ensuring Confidentiality

TransPerfect Legal on

Legal Cybersecurity - One of the core advantages that drives parties to arbitrate is the promise of confidentiality. Unlike public court proceedings, arbitrations provide parties with a private forum through which to air and...more

Mitratech Holdings, Inc

Phishing Preparedness: What Does a Risk Manager Recommend?

Carly Franks, Senior IT Security Risk & Compliance Analyst at Mitratech, has more good guidance to offer on the subject of phishing, so your employees can stymie the fraudsters out to purloin personal data. ...more

Ballard Spahr LLP

Hackers Capitalizing on Coronavirus

Ballard Spahr LLP on

As people across the country and world try to figure out how to protect themselves against the spread of coronavirus, hackers are working hard to spread their own viruses....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #2

Robinson & Cole LLP on

Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more

Robinson+Cole Data Privacy + Security Insider

Iranian Cyber-Attacks and the End of Support for Windows 7 and Windows Server 2008

After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more

Bass, Berry & Sims PLC

Privacy Perils: The Expensive New Threat

By now, you’ve heard a horror story or two about ransomware. The city of Baltimore’s tale stands out. After cyber-criminals attacked the city’s servers and applications, they demanded $76,000 to decrypt the affected files....more

Bass, Berry & Sims PLC

Privacy Perils: Black Friday Blues

Bass, Berry & Sims PLC on

With the holiday season fast-approaching, thrifty shoppers across the country will soon be looking to spend (and save) their hard-earned money during what is arguably the busiest shopping weekend of the year, spanning Black...more

Snell & Wilmer

Taxpayer Cybersecurity – Step 3: Avoid E-mail Phishing Scams

Snell & Wilmer on

The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more

Robinson+Cole Construction Law Zone

Business Email Compromises Bilking U.S. Companies Out of $301M Per Month

The United States Treasury Department came out with a report last week that concludes that business email compromises (BEC) are costing U.S. companies more than $301 million per month. The report confirms that the two...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

A&O Shearman

Cyberattack - remedies against anonymous hackers

A&O Shearman on

The English High Court will adopt flexible and innovative approaches to help victims of cybercrime obtain remedies against defendants who are either unknown or refuse to engage in proceedings. The court confirmed its...more

Foley & Lardner LLP

Strategies for Protecting Against Vendor Payment Fraud

Foley & Lardner LLP on

Cybercrime is an ever-increasing threat from which manufacturers are not immune. Although reliable statistics are not available, one particular type of scheme that seems to be on the rise is vendor payment fraud. In cases of...more

Bass, Berry & Sims PLC

Privacy Perils: Phishing Scams Cast Wider Net

Bass, Berry & Sims PLC on

Have you noticed an uptick in suspicious-looking emails in your inbox? Perhaps received a secure message notification from someone who didn't actually send you a secure message? You're not alone. Phishing scams are becoming...more

Bass, Berry & Sims PLC

Privacy Perils: Not I Said the Fly, Nor Me Said the Bee

We have all been cautioned so often about the risks of opening malware-infected email attachments, or clicking on fraudulent links embedded in an email, we can become desensitized to the actual danger. We think "surely, in...more

McManis Faulkner

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Womble Bond Dickinson

Small and Mid-Sized Companies are the New Targets of Business Email Compromise

Womble Bond Dickinson on

Originally published in the Upstate Business Journal on February 15, 2018. Meet Peter — a longtime employee and the backbone of your business’s day-to-day finance and accounting operations. Today he got an email from the...more

Fisher Phillips

Employers Take Note: Tax Season Phishing Scams on the Rise

Fisher Phillips on

It is tax season once again, and with it comes an increased threat of phishing scams targeting human resources and payroll personnel. In 2016, the IRS alerted employers to a then-emerging email phishing scheme in which...more

41 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide