News & Analysis as of

Email Data Security Cyber Attacks

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Foley Hoag LLP - Security, Privacy and the...

As If Bank Failures Aren’t Enough – Hackers Are Exploiting the Chaos to Breach Security

The Massachusetts State Police Commonwealth Fusion Center (CFC) believes that cyber actors may use the current bank failures for future phishing and business email compromise (BEC) attacks. Cyber actors often use current...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 3, March 2023

Amazon Sued for Not Telling New York Store Customers about Tracking Biometrics - “Thanks to a 2021 law, New York is the only major American city to require businesses to post signs letting customers know they’re tracking...more

Shutts & Bowen LLP

Ransomware and Phishing Dangers On the Rise

Shutts & Bowen LLP on

Internet users have (mostly) learned to avoid scams by supposed Nigerian princes looking to share a vast inheritance, and there has been a rise in awareness of other common signs of phishing attempts, such as poor spelling...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

Bass, Berry & Sims PLC

Privacy Peril: Back It Up

Bass, Berry & Sims PLC on

A recent Privacy Peril advised of the increasing cyber risk from nation state attacks, particularly as a result of the war in Ukraine. There is, of course, little we can do to thwart cyber assaults on vital nerve centers....more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Wyrick Robbins Yates & Ponton LLP

Fraudulent Wire Transfers: Who Bears the Loss and How to Prevent Becoming A Victim

Cybercriminals exploited remote work during the COVID-19 pandemic.  In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more

NAVEX

Watch Out for Hoax Reports to Your Hotline

NAVEX on

Recent compliance-related news coverage has identified an increase in anonymous hoax emails and online reports posted to companies through their internal reporting systems. Whether filed via email or through an online...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 21, Number 4. Privacy Briefs: April 2021

Report on Patient Privacy 21, no. 4 (April 2021) - A Texas Medicaid subcontractor has been terminated after a data breach caused by a ransomware attack originating from Russia exposed the personal information of tens of...more

McAfee & Taft

Beware of phishing schemes relating to aviation escrow matters

McAfee & Taft on

The McAfee & Taft Aviation Group has recently seen an increase in the number of phishing schemes relating to aviation escrow matters. Phishing is the fraudulent attempt to obtain sensitive information or data, such as...more

Bass, Berry & Sims PLC

Privacy Perils: Respect Your Elders

It is a commonly-held belief that younger, more tech-savvy individuals are less likely to engage in risky cyber practices than their “senior,” pre-internet counterparts. Recent evidence, however, indicates to the contrary...more

Mitratech Holdings, Inc

Phishing Preparedness: What Does a Risk Manager Recommend?

Carly Franks, Senior IT Security Risk & Compliance Analyst at Mitratech, has more good guidance to offer on the subject of phishing, so your employees can stymie the fraudsters out to purloin personal data. ...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #2

Robinson & Cole LLP on

Ransomware Attacks Predicted to Occur Every 11 Seconds in 2021 with a Cost of $20 Billion - Confirming what we are seeing in the field, cybersecurity firm Cybersecurity Ventures has predicted that, globally, businesses in...more

Robinson+Cole Data Privacy + Security Insider

Iranian Cyber-Attacks and the End of Support for Windows 7 and Windows Server 2008

After the killing of Qassem Soleimani on January 3, 2020, by the U.S. government, the cybersecurity news industry has been abuzz about whether Iran will engage in cyber terrorism, and if so, to what degree, as part of its...more

Bass, Berry & Sims PLC

Privacy Perils: The Expensive New Threat

By now, you’ve heard a horror story or two about ransomware. The city of Baltimore’s tale stands out. After cyber-criminals attacked the city’s servers and applications, they demanded $76,000 to decrypt the affected files....more

Clark Hill PLC

Business Email Compromise: Be Prepared!

Clark Hill PLC on

Business Email Compromise (BEC) is a growing cybercrime epidemic, with staggering losses to businesses and organizations of all sizes. BEC is a scheme in which an attacker uses fraudulent email to impersonate an executive,...more

Fisher Phillips

Don’t Take the Bait! “Spear Phishing” and “Whaling” Take Scams to the Next Level

Fisher Phillips on

For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more

Foley & Lardner LLP

Strategies for Protecting Against Vendor Payment Fraud

Foley & Lardner LLP on

Cybercrime is an ever-increasing threat from which manufacturers are not immune. Although reliable statistics are not available, one particular type of scheme that seems to be on the rise is vendor payment fraud. In cases of...more

Bass, Berry & Sims PLC

Privacy Perils: Phishing Scams Cast Wider Net

Bass, Berry & Sims PLC on

Have you noticed an uptick in suspicious-looking emails in your inbox? Perhaps received a secure message notification from someone who didn't actually send you a secure message? You're not alone. Phishing scams are becoming...more

BakerHostetler

When Obscurity Is Not a Defense

BakerHostetler on

Many organizations facing a data-security incident struggle to understand how or why their organization was targeted in an attack. Most simply believe they are too small or too obscure to be targeted by malicious cyber...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide