News & Analysis as of

Data Privacy Phishing Scams Data Protection

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Katten Muchin Rosenman LLP

Privacy, Data and Cybersecurity Quick Clicks | Issue 17

Katten's Privacy, Data and Cybersecurity Quick Clicks is a monthly newsletter highlighting the latest news and legal developments involving privacy, data and cybersecurity issues across the globe....more

Hogan Lovells

Security Snippets: Espionage group expands global phishing campaign

Hogan Lovells on

Russia-linked threat actor Fancy Bear is conducting a wave of phishing campaigns impersonating entities across Europe, Americas, and Asia, focusing on Ukraine-related targets....more

Saul Ewing LLP

Cybersecurity in Video Games & Esports

Saul Ewing LLP on

In this episode of “Lawyers With Game,” host Darius Gambino from Saul Ewing’s Video Gaming and Esports Practice chats with colleagues Sandy Bilus and Evan Foster from Saul Ewing’s Cybersecurity & Privacy group about data...more

Society of Corporate Compliance and Ethics...

[Webinar] HIPAA Compliance: The Importance of an Effective Privacy and Security Aware - August 17th, 12:00 pm - 1:30 pm CT

Learning Objectives - The fundamental foundation of establishing a solid HIPAA compliance, privacy and cyber security awareness program - The importance of end user HIPAA compliance, privacy and cyber security training for...more

Troutman Pepper

What to Do When a Phishing Attack Happens to You - The Consumer Finance Podcast

Troutman Pepper on

Please join Consumer Financial Services Partner Chris Willis and his colleagues Privacy + Cyber Associate Sadia Mirza and Privacy + Cyber Partner Kamran Salour as they discuss phishing. Kamran and Sadia break down what...more

McAfee & Taft

Employers, beware of scammers hijacking your identity to commit job recruitment fraud

McAfee & Taft on

Just when it seems that consumers have caught on to one particular online scam or phishing expedition – think of the ubiquitous Nigerian prince email scam that first began making the rounds in the 1990s – a new one comes...more

Sunstein LLP

Phishing Attacks: The FTC Steps Up Its Standards

Sunstein LLP on

Phishing schemes encompass fraudulent emails, text messages, phone calls, or web sites designed to manipulate people into downloading malware, sharing sensitive information, or otherwise exposing themselves or their...more

Kohrman Jackson & Krantz LLP

Ten Ways You Can Protect Your Privacy on Social Media

Social Media connects people across the world by providing users with a means to share content. It has undoubtedly become a huge part of our daily routines. In 2021, Americans spent an average of two hours and thirty minutes...more

Morgan Lewis - Tech & Sourcing

Phishing: Proactive Measures to Guard Against Cyberattacks

Despite general awareness regarding phishing (we have written about phishing in a prior post), it still remains one of the most common ways to accomplish cyberattacks. It should be no surprise that cybercriminals are...more

Troutman Pepper

Cybersecurity Awareness Month

Troutman Pepper on

The holiday season is around the corner. For most of us, it is a time of joy, cheer, excitement, and hopefully some relaxation. For cyber criminals, however, this is the busy season (same goes for Santa and his elves). ...more

King & Spalding

What’s Trending Across Asia in the Data, Privacy and Security Space?

King & Spalding on

As we live and work in an increasingly globalized and computerized world, data, privacy and security (DPS) issues will converge across regions. Asia, however, has some of its own unique challenges trending as we discuss...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Morgan Lewis

Considerations When Assessing Your Company’s Vulnerability to a Cyberattack

Morgan Lewis on

The current cyberrisk landscape comprises a range of evolving threats, from phishing schemes to third-party vendor vulnerabilities. Companies looking to secure valuable assets, including data, can better prevent and manage...more

Society of Corporate Compliance and Ethics...

Cyber risks: How are you measuring and mitigating them?

CEP Magazine (June 2022) - Picture this: The workday starts out like most other days and inevitably involves electronic devices for many of us. Our expectation, realistic or not, is that technology will work at our command...more

Buckingham, Doolittle & Burroughs, LLC

Busting Cyber Myths: I’m Not a Target (and other lies you tell yourself)

In the first of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management and Eric Smith, recently retired Special Agent In Charge of the...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

Goldberg Segalla

Death by a Thousand Paper Cuts: The Scourge That Is Business Email Compromise

Goldberg Segalla on

In June 2014, the CEO of Omaha-based Scoular Company sent a series of emails to his company’s controller to let him know that the company was in negotiations to buy a Chinese company. The emails highlighted the sensitivity of...more

Health Care Compliance Association (HCCA)

Hybrid Workforces and Compliance with Sheila Limmroth

Hybrid work is likely here to say, and, as Sheila Limmroth, privacy specialist at DCH Health System, and the author of the chapter Hybrid Work Environment in the Complete Healthcare Compliance Manual observes in this...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 3. Privacy Briefs: March 2022

Report on Patient Privacy 22, no. 3 (March, 2022) - HHS said in early March that it was not aware of any specific threat to U.S. health care organizations stemming from the Russian invasion of Ukraine. “However, in the...more

Miller Nash LLP

The Ninth Circuit Hooks a California Policyholder Win Under a Commercial Crime Policy in a Phishing Scam Case

Miller Nash LLP on

The Ninth Circuit Court of Appeals delivered a policyholder insurance coverage win in a phishing case centered in Long Beach, California (home of our California office), in Ernst & Haas Mgt. Co. v. Hiscox, Inc., 23 F.4th 1195...more

Fisher Phillips

Top 5 Data Security and Privacy Trends Revealed by Feds – and 5 Proactive Steps Employers Can Take Today

Fisher Phillips on

The United States Cybersecurity & Infrastructure Security Agency (CISA) recently issued a Joint Advisory providing an overview of 2021 ransomware trends, noting several key developments that employers should take note of. The...more

Robinson+Cole Data Privacy + Security Insider

New Jersey Settles with Cancer Center Over Business Email Compromise

One of the challenging things about HIPAA (Health Insurance Portability and Accountability Act) enforcement is the fact that both the Office for Civil Rights and State AGs have jurisdiction to assess fines and penalties for...more

Morgan Lewis - Tech & Sourcing

Sounds Phishy – The Rise of Vishing Scams

Broad awareness has been made about cyberattacks in the form of phishing that typically use email messages to lure victims into divulging sensitive information or opening a link that allows malware to infiltrate their device....more

Fisher Phillips

Recent Data Breach at Twitch Exposes Danger for All Businesses

Fisher Phillips on

This fall has been a busy season for privacy professionals. From public education institutions and hospitals, to online broadcast and streaming platforms, we’ve seen a surge of data breaches that coincides with the upcoming...more

71 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide