News & Analysis as of

Scams Passwords

K2 Integrity

Scanning, Chatting, And Shopping: Holiday Risks To Organizations

K2 Integrity on

Today’s mobile workforce means that many employees blend their personal and professional lives on the same devices, possibly putting organizations’ data at risk. During the holiday season, in the search for gifts, low prices,...more

Ward and Smith, P.A.

Senior Savvy: Wise Owls Navigating Cyber Scams

Ward and Smith, P.A. on

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

StoneTurn

Tips to Avoid the Common Fraudster: Lessons from Corporate Investigations

StoneTurn on

With scams evolving and growing in volume and maturity, it is more important than ever before to be vigilant about what information is available to nefarious actors. This article provides common scam scenarios, tips for...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - November 2019 #3

Robinson & Cole LLP on

It has been reported by Troy Hunt, the security researcher who provides the "Have I Been Pwned" free breach notification service, that 1.4 million passwords and personal information of customers of GateHub, a cryptocurrency...more

McManis Faulkner

Take the Test: Will You Fall Prey to Phishing? 6 Tips to Identifying an Email Scam

McManis Faulkner on

Email is the driving force of communication. Lawyers often receive over 100 emails a day. It can be easy to overlook potential scams hidden in your inbox. Hopefully, your firm has the proper security protocols in place:...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide