News & Analysis as of

Email Fraud Cyber Threats

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Arnall Golden Gregory LLP

Business Email Compromise Fraud: Should the Party Best Positioned to Avoid the Fraud Bear the Loss?

Business email compromise (“BEC”) occurs when a payee’s business email account is compromised or impersonated. The threat actor, posing as the payee or its representative (e.g., the head of the accounting department), sends...more

Arnall Golden Gregory LLP

Account Takeover and Business Email Compromise Fraud: Legally Puzzling Payments Problems

In a series of three articles, we will address the ascendency of account takeover (“ATO”) and business email compromise (“BEC”) fraud — the unfortunate occurrence where a payor or intended payee’s account is compromised,...more

Guidepost Solutions LLC

Defending Your Law Firm Against Cyber Threats

In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more

Venable LLP

Online Fraud Aimed at Independent School Business Offices: Business Email Compromise

Venable LLP on

Independent school business officers are tasked with a wide range of responsibilities, including payroll, accounting, accounts payable, investments, and facility security. Unfortunately, many independent schools are...more

Latham & Watkins LLP

The Pervasive Threat of Business Email Compromise Fraud - and How to Prevent It

Latham & Watkins LLP on

Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more

Troutman Pepper Locke

Cyber Threats and Internal Accounting Controls

Troutman Pepper Locke on

On October 16, 2018, the Securities and Exchange Commission (“SEC”) issued an investigative report (see here) pursuant to Section 21(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) warning public companies that...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide