5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
"Thank you for your order." "We tried delivering your package." We have all seen these subject lines in our inbox, but some are not so innocent. Business impersonation scams are not new, but some of their tricks are. These...more
With hurricane season upon us and after this week’s devastation and heartache from Hurricane Ian, there will be opportunities to help the victims in many ways, including financial assistance...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the EU's General Data Protection Regulation going into effect despite some member states lacking in local necessary legislation, a pair of U.S. states'...more
My violin was made in 1962 by a luthier named Umberto Lanaro, but it bears the label of Eligio Puccini and says it was made in 1947. Lanaro chose in effect to use Puccini’s identity when making my violin, as Lanaro...more
Unfortunately, it is common for cyber criminals to capitalize on natural disasters. The Department of Homeland Security (“DHS”) warns users to exercise caution in handling any email with subject line, attachments, or...more
Judge Trims Proposed Class Action Over Wendy’s Data Breach - Torres v. Wendy’s Int’l, LLC, No. 16-cv-0210 (PGB) (DCI) (M.D. Fla. Mar. 21, 2017). A U.S. district court judge in Florida trimmed a proposed class action...more
In one type of phishing, fraudsters impersonate your business when contacting consumers. Phishing victims think they’re giving information to your company — by phone or Internet —but instead give personal or financial...more
On March 6, 2017, the Federal Trade Commission (FTC) released tips and a video to businesses that have been impersonated by Phishing schemes. The guidance, entitled “Has a phishing scam hooked your company’s good name?”...more
There is no such thing as compliance with the NIST Cybersecurity Framework (FTC). In September, the FTC dispelled a commonly held misconception regarding the NIST Framework: It “is not, and isn’t intended to be, a standard or...more