5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
On April 8, the Office of the Comptroller of the Currency (OCC) officially notified Congress of a significant information security incident involving its email system. This notification, mandated by the Federal Information...more
In an increasingly digital world, the rise in cybercrime involving email scams has become a significant threat to individuals and organizations alike. These sophisticated attacks exploit human psychology and technological...more
The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more
This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more
On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) issued an Alert outlining multiple Common Vulnerabilities and Exposures...more
Cybercriminals exploited remote work during the COVID-19 pandemic. In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more
If you think the Russians are only targeting U.S. companies and the defense industry, think again. The cyber war between Russia and the U.S. has escalated since the President threw down the gauntlet on Putin, and the...more
If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more
CYBERSECURITY - GAO Report Identifies Need for DOE to Address Risks to Electrical Distribution System - The United States Government Accountability Office (GAO) recently completed and published a study on electricity...more
State and local governments have been hammered with business email compromise (BEC) attacks over the past few years and the onslaught does not appear to be abating....more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in 2021 will fall victim to a ransomware attack every 11 seconds, down from every 14 seconds in...more
Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
Report on Patient Privacy 20, no. 1 (January 2020) - ? A cybersecurity breach temporarily halted cancer radiation treatment services at the Cancer Center of Hawaii on Oahu,[1] the center said. The center, which provides...more
After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the California attorney general's draft regulations on the California Consumer Privacy Act, the CJEU's clarified rulings on the use of cookies, the...more
The National Cyber Security Centre (NCSC), an organisation of the UK Government that provides cybersecurity advice and support for the public and private sector, published an article earlier this year relating to a recent...more
Phishing campaigns continue to be one of the most successful ways for malicious intruders to access company information, including personal information of employees and customers. Phishing emails continue to get more and more...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more