5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Business email compromise (BEC) fraud, driven by technology and increasing sophistication by criminal organizations, has become a major issue for both consumers and financial institutions. According to a September 2024...more
Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more
The Western Australian District Court’s recent decision in Mobius Group Pty Ltd v Inoteq Pty Ltd1 highlights the potential consequence for the innocent party where fraudulent changes in bank details are sent from their...more
Whenever large sums of money are involved, don’t be surprised if scammers come out of the woodwork. This is especially true today, as criminals have a variety of tools at their disposal, such as phishing emails, designed to...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Most policyholders are aware of the danger of losses from fraudulent instructions and invoices accomplished through what is known as “social engineering” or related methods. Often this is carried out by an email claiming to...more
Last week, the Ohio Supreme Court ruled that victims of anonymous online attacks have an extension of time to file a lawsuit, holding that they can file a suit one year from date the targeted publication is discovered. This...more
Data recently released by the Federal Trade Commission (FTC) shows how likely it is for a typical communication from a well-known company to be a scam in disguise. Whether it’s a fabricated email, a security pop-up with a...more
Business email compromise (“BEC”) occurs when a payee’s business email account is compromised or impersonated. The threat actor, posing as the payee or its representative (e.g., the head of the accounting department), sends...more
FinCEN se ha enterado de intentos fraudulentos de solicitar información de personas y entidades que pueden estar sujetas a requisitos de presentación de reportes en virtud de la Ley de Transparencia Corporativa (“CTA”). Los...more
FinCEN has learned of fraudulent attempts to solicit information from individuals and entities who may be subject to reporting requirements under the Corporate Transparency Act (CTA). Scammers are on the hunt to steal...more
In a series of three articles, we will address the ascendency of account takeover (“ATO”) and business email compromise (“BEC”) fraud — the unfortunate occurrence where a payor or intended payee’s account is compromised,...more
Your company’s talent is its lifeblood. Job postings for qualified individuals and other recruitment activities are vital to its operations. What happens, then, when scammers disrupt your business by conducting phishing...more
In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more
Scammers know no bounds, including in the world of trademarks. NGE has noted a recent uptick in fraudulent e-mails, calls, and texts directed at trademark applicants and registrants. These scammers typically use information...more
Over the years many clients have forwarded to us scam trademark mailings. These mailings come from various official-sounding sources, all of which seek money to allegedly take action regarding the client’s trademarks....more
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw...more
An important component of brand ownership is exercising vigilance against fraudulent practices, such as counterfeiting and trademark pirating. Trademark owners must now also be alert to fraudulent communications from...more
One recent victim of scams preying on U.S. trademark filers and registrants answered a call that appeared to be from the United States Patent and Trademark Office (USPTO). It wasn’t. The target of the scam was forced to...more
Home Health Care Owner Sentenced to Nine Years in Prison for Medicare Fraud Scheme - This week, the owner of a home health company was sentenced to nine years in prison for orchestrating a nearly $2.8 million scheme...more
Though the world is no longer at a standstill due to COVID and our lives have returned to something resembling “normal,” the pandemic forever cemented remote and hybrid work into existence. Indeed, such flexible work...more
Every month, Erise’s trademark attorneys review the latest developments at the U.S. Patent and Trademark Office, in the courts, and across the corporate world to bring you the stories that you should know about: Travis...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s blog is a post-holiday bonus, covering the past two weeks...more
Especially during the holi-daze, it can be easy to let our safeguards down and fall prey to scammers looking to make a quick buck. Trademark applicants and registrants interacting with the U.S. Patent and Trademark Office...more
In part one of this three-part blog series, we’re going back to the basics. In this article, we’ll answer the question: what is a whistleblowing hotline? A whistleblowing hotline is a channel that allows employees and others...more