5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Courts Rule for Private Email and Social Media Discovery - In two separate recent rulings, courts granted discovery related to private email accounts and private social media account usernames in requests made by...more
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more
Cyber criminals are taking advantage of the increase in online holiday shopping due to the pandemic. They know people are buying gifts online and sending the packages to the recipients. Often, the recipients do not know they...more
A new study by Check Point Research shows that cyber criminals are using well-known brands to lure victims into clicking on nefarious links, providing personal information or credentials, or getting users to transfer money....more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs. Now, researchers at Cylance have discovered...more
According to a February 2017 American Bar Association press release, “cyber-related risks have escalated based on the sensitivity and nefarious uses of that data. Last year, for example, the Manhattan U.S. attorney’s office...more
The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more
Amid cyber-attacks that have spread around the globe affecting at least 150 countries, the Federal Bureau of Investigation has issued a FLASH report warning of the effects of a ransomware known as “WannaCry.” The warning –...more
We follow the Verizon Data Breach Investigation Report each year. It just hit the news stand and as always, is full of insights. The report collected data from 65 organizations in 84 countries, including 42,068...more
Last week, IBM published its X-Force Threat Intelligence Index (Index), which summarizes the state of leaked records and vulnerabilities to data in 2016. It is depressing, but informative....more
On December 30, 2016, the Los Angeles Community College computer network was kidnapped by cyber criminals requesting a ransom for its return. The ransomware encrypted the college’s entire network system, including...more
A recent report from Imperva, Inc. has identified a Phishing as a Service (PhaaS) being offered on a Russian website. The United States Computer Emergency Readiness Team defines phishing as “an attempt by an individual or...more
The Department of Homeland Security (“DHS”) recently issued a joint alert with the Canadian Cyber Incident Response Centre warning of two new ransomware threats behind recent well-publicized attacks against healthcare...more