5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
On 7/16/24, the IRS warned taxpayers and tax professionals how email scams continue to aim to trick taxpayers by stealing sensitive tax and financial information. This information consists of passwords, bank account numbers,...more
The College of Patent Agents & Trademark Agents (CPATA) recently issued an alert regarding a surge in fraudulent emails targeting trademark owners. As is typical of these “phishing” scams, the emails often pressure recipients...more
"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more
El 3/28/24, el IRS inició su lista anual de la Docena Sucia (“Dirty Dozen”) con una advertencia para que los contribuyentes estén al tanto de la evolución de las estafas de smishing y phishing diseñadas para robar información...more
On 3/28/24, the IRS kicked off its annual Dirty Dozen list with a warning for taxpayers to be aware of evolving smishing and phishing scams designed to steal sensitive taxpayer information. Smishing and phishing scams arrive...more
The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more
In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more
We often remind our clients about the importance of taking cybersecurity measures. In response, we frequently hear the question, “How can I suffer a cyber loss if I don’t have custody of the funds?”...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
Over the years many clients have forwarded to us scam trademark mailings. These mailings come from various official-sounding sources, all of which seek money to allegedly take action regarding the client’s trademarks....more
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw...more
One recent victim of scams preying on U.S. trademark filers and registrants answered a call that appeared to be from the United States Patent and Trademark Office (USPTO). It wasn’t. The target of the scam was forced to...more
Every month, Erise’s trademark attorneys review the latest developments at the U.S. Patent and Trademark Office, in the courts, and across the corporate world to bring you the stories that you should know about: Travis...more
It’s late Friday afternoon and the COO of your company emails you with an urgent request to send him the HR spreadsheet you have been working on. Frantic, you immediately reply and send him the requested information. But it...more
Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more
Especially during the holi-daze, it can be easy to let our safeguards down and fall prey to scammers looking to make a quick buck. Trademark applicants and registrants interacting with the U.S. Patent and Trademark Office...more
The FBI has announced that university aerospace researchers, both foreign and in the U.S., have become a target of a specific phishing scheme that is being conducted by threat actors. Specifically, researchers with access to...more
This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more
Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more
“Business Email Compromise Scams” or “BEC scams” typically target companies that conduct wire transfers with entities abroad. For example, a fraudster may use an email address that is very similar to that of a business’s...more
The Massachusetts State Police Commonwealth Fusion Center (CFC) believes that cyber actors may use the current bank failures for future phishing and business email compromise (BEC) attacks. Cyber actors often use current...more
On 3/21/23, day two of the annual Dirty Dozen tax scams campaign, the IRS issued a Phishing and Smishing warning to taxpayers to remain vigilant against email and text scams aimed at tricking taxpayers about refunds or tax...more
Ankura has seen an increase in threat actors utilizing Amazon AWS, Google Cloud, and Microsoft Azure to obfuscate their malicious activities and make the traffic appear legitimate. So, what does this look like?...more
Every year, the IRS issues a list of the top 12 scams and schemes for taxpayers to take caution to avoid. While the first of April marked the annual “April Fools” period, I don’t want you to be fooled by IRS scams. So, while...more
“Rejected.” Your pulse quickens as you read the letter your mother received from the IRS after filing her tax return. Someone else filed her taxes before you and collected her refund. You were hoping that money would help...more