Podcast - Betty... embargaron Ecomoda
Fraud, the silent epidemic
10 For 10: Top Compliance Stories For the Week Ending, May 3, 2025
2 Gurus Talk Compliance: Episode 51 – The Compliance Week at 20 Edition
The Next FCRA Frontier: Identity Theft and CFPB Updates — FCRA Focus Podcast
Daily Compliance News: April 29, 2025, The GenZ/RTO Edition
Adventures in Compliance: The Novels – A Study in Scarlet, Introduction to Compliance Lessons
Unlocking the Secrets of Reverse Mortgages — The Consumer Finance Podcast
False Claims Act Insights - DOJ’s Reliance on FCA to Pursue Covid-Related Fraud
10 For 10: Top Compliance Stories For the Week Ending April 12, 2025
Elder Financial Exploitation
Daily Compliance News: April 7, 2025, The Whistleblowers Awarded Edition
An Ounce of Prevention Podcast | Preparing for the UK Failure to Prevent Fraud Offence
Sunday Book Review: March 23, 2025, The Hard-Boiled Edition
10 For 10: Top Compliance Stories For The Week Ending, March 22, 2025
Daily Compliance News: March 14, 2025, The $200 Transaction Edition
PilieroMazza Annual Review: What DOJ’s 2024 FCA Report Means for Government Contractors
Episode 354 -- The New Era of Compliance: Generative AI, Data and Innovation
12 Days of Regulatory Insights: Day 4 - A Focus on the FCA – Regulatory Oversight Podcast
Corruption, Crime & Compliance: Raytheon Pays $950 Million to Resolve Fraud, FCPA, ITAR and False Claims Act Violations
Unfortunately, identity theft continues to increase, and according to Identitytheft.org, the statistics are going to get worse in 2025. Some of the statistics cited by Identitytheft.org include: 1.4 million complaints of...more
When we talk to clients about cybersecurity, it tends to conjure up images of ransomware, systems that are encrypted and inaccessible, and stolen data. For the real estate sector, ransomware isn’t the largest cybersecurity...more
A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more
Businesses are increasingly defrauded through common scams known as business email compromise scams (BEC scams) for which they do not have insurance to cover the resulting losses. Fortunately, there are easy-to-implement...more
At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more
A recent cyberattack on a Michigan township has exposed weaknesses in the bond-closing process. In this incident, hackers stole over $25 million in bond proceeds by using spoofed email addresses to provide fraudulent wire...more
The recent massive data breach at National Public Data (NPD), a background check company, has potentially compromised the personal information of millions, if not billions, of individuals, including their Social Security...more
The recent increase in smishing and vishing schemes is prompting me to remind readers of schemes designed to trick users into providing credentials to perpetrate fraud. We have previously written on phishing, smishing,...more
Pursuant to President Biden’s October 2023 AI executive order, the US Department of Treasury (Treasury) released a report on cybersecurity risks in the financial services sector in March 2024. While recognizing the...more
The race to develop AI and calls to regulate it are heating up around the world. In November 2023, 28 countries, including the United States, United Kingdom, China, and the European Union, met and pledged to work together to...more
On October 30, 2023, the SEC filed charges against SolarWinds Corp. and its chief information security officer (CISO), alleging: ..Failures to disclose known cybersecurity vulnerabilities affecting the company’s “crown...more
Every year, BakerHostetler collects and analyzes various metrics about the incident response matters we handle. In 2022, we handled over 1,160 incidents. The most striking trends we saw across those incidents were an overall...more
AML compliance for reporting entities has never been of greater critical importance than it is today. With the growing sophistication of criminals and the methods and technologies that they employed, combined with the...more
A cyber incident response plan is a set of guidelines and protocols designed to help an organization detect, respond, contain, and manage any form of a cybersecurity breach. It outlines how best to safeguard the organization...more
With the holiday season upon us and online goods and services flying off the virtual shelves, companies should not lose sight of the increased risk of phishing and cyberattacks. Society’s reliance on online commerce means...more
Make sure you’re fully equipped to manage compliance risks in the nonprofit sector - Nonprofit organizations are exposed to a diverse universe of compliance risks, including many that are unique to the nonprofit sector....more
Between 2016 and 2019, Business Email Compromise (BEC) scams cost American organizations US$3.1 billion in losses and Canadian organizations US$33.6 million. This type of pervasive scam targets large and small businesses...more
The U.S. Securities and Exchange Commission (SEC) has joined the government chorus in sounding the alarm about the rapid rise in "business email compromises" that are victimizing organizations across industry sectors....more
Financial institutions must meet standards for safeguarding customer data given the particularly sensitive information they hold, and regulators have been stepping up their efforts to provide guidance on just how they must do...more