News & Analysis as of

Email Risk Management

Hudson Cook, LLP

Technical Violations of State Collection Practices Laws Can Lead to Class Action Liability

Hudson Cook, LLP on

If you are reading this article, you are likely aware that a creditor collecting its own debts in its own name is not a "debt collector" under the federal Fair Debt Collection Practices Act ("FDCPA") or its implementing rule,...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Lewis Roca

New Trademark Scam

Lewis Roca on

Over the years many clients have forwarded to us scam trademark mailings. These mailings come from various official-sounding sources, all of which seek money to allegedly take action regarding the client’s trademarks....more

Moritt Hock & Hamroff LLP

Beware: Scams Targeting U.S. Trademark Applicants and Owners Are Increasingly Persuasive

One recent victim of scams preying on U.S. trademark filers and registrants answered a call that appeared to be from the United States Patent and Trademark Office (USPTO). It wasn’t. The target of the scam was forced to...more

Erise IP

What’s Trending in Trademarks, January 2024: Travis Kelce’s IP Era, Liquid Death vs. Arnold Palmer, USPTO Scams

Erise IP on

Every month, Erise’s trademark attorneys review the latest developments at the U.S. Patent and Trademark Office, in the courts, and across the corporate world to bring you the stories that you should know about: Travis...more

Bradley Arant Boult Cummings LLP

Business Email Compromise: The Most Prevalent – and Preventable – Cyber Risk

Ransomware attacks that shut business down to zero and data breaches that disclose the personal information of customers, vendors and employees justifiably strike fear in the hearts of executives everywhere. Organizations can...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Sterne, Kessler, Goldstein & Fox P.L.L.C.

MarkIt to Market® - No, No, No! How to Avoid Scams and Stay Merry this Holiday Season

Especially during the holi-daze, it can be easy to let our safeguards down and fall prey to scammers looking to make a quick buck. Trademark applicants and registrants interacting with the U.S. Patent and Trademark Office...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

American Conference Institute (ACI)

[Webinar] Setting the Record Straight on AI & ML for Legal and Compliance: What They Are – and Aren’t – and the Lesser-Known Risks...

During this highly anticipated webinar, legal and forensic experts will provide invaluable takeaways on the risks, benefits and best practices for leveraging artificial intelligence and machine learning for your compliance...more

Spilman Thomas & Battle, PLLC

Cyberattacks and Construction – A Hard Hit Industry

When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks....more

Constangy, Brooks, Smith & Prophete, LLP

As social engineering email attacks increase in sophistication, employee training and awareness rise to the forefront

The Nigerian prince seems almost quaint. Gone are the days when the Nigerian prince was the only nefarious figure menacing our inboxes. A simple yet elegant scheme – our supposed prince unexpectedly fell upon a large sum...more

Vinson & Elkins LLP

Updated DOJ Guidance on Devices and Ephemeral Messaging

Vinson & Elkins LLP on

On March 3, 2023, the Department of Justice (“DOJ”) issued long-awaited guidelines on how it will evaluate whether companies have implemented appropriate guidance and controls on the use of personal devices and third-party...more

Lowenstein Sandler LLP

Call Me, Maybe? The Stealth Disappearance of Social Engineering and Fraudulent Instruction Coverage

Lowenstein Sandler LLP on

Anyone who owns a cellphone or uses an email address has received a communication from a scammer seeking to extract confidential information or trick the recipient into sending money to foreign countries. These attempts come...more

Bass, Berry & Sims PLC

Privacy Peril: Stealers Wheel (Stuck in the Middle with You)

Bass, Berry & Sims PLC on

In one type of “man-in-the-middle” (MITM or MTM) attack, a bad actor inserts himself between a user (individual or business) and a web application (such as a bank’s website) to capture sensitive or personal confidential...more

J.S. Held

How to Avoid the Most Common Causes of Cybersecurity Incidents

J.S. Held on

Cybercrime is at an all-time high, with just the cybercrime insurance industry alone expecting to grow from $8 billion globally in 2020 to $20 billion by 2025.1 Although cyber liability insurance policies now exist to help...more

K2 Integrity

Cyber Predictions 2022

K2 Integrity on

Where We Stand - This year kicks off against the backdrop of the security flaw found in Log4j, a system-logging code library widely used in applications and services across the Internet. In the aftermath of this crisis, a...more

Hinshaw & Culbertson - Law Firm Cyber Alerts

"Bonus Payment" Phishing Emails Are Seeking New Ransomware Victims

Risk Management Question - How can employees mitigate the risk of falling for phishing scams purportedly sent by their company's HR department? The Issue - Scammers often know just the right thing to say to pique an...more

Wyrick Robbins Yates & Ponton LLP

Fraudulent Wire Transfers: Who Bears the Loss and How to Prevent Becoming A Victim

Cybercriminals exploited remote work during the COVID-19 pandemic.  In 2020, the FBI’s Internet Crime Complaint Center (IC3) saw a record 70% increase in the number of reported internet scams and losses exceeding $4.2...more

Robinson+Cole Data Privacy + Security Insider

Microsoft Warns of Tricky O365 Phishing Attack

If you are an organization that uses Microsoft Office 365 as your email platform, be on the lookout for a new tricky phishing attack recently used by cyber criminals. ...more

K2 Integrity

Targeted Cyber Frauds in Today’s Global Crisis

K2 Integrity on

You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more

Mitratech Holdings, Inc

Phishing Preparedness: What Does a Risk Manager Recommend?

Carly Franks, Senior IT Security Risk & Compliance Analyst at Mitratech, has more good guidance to offer on the subject of phishing, so your employees can stymie the fraudsters out to purloin personal data. ...more

McManis Faulkner

Looks Phishy? It Probably Is: Tech Safety During The COVID-19 Outbreak

McManis Faulkner on

These are truly unprecedented times. With the coronavirus outbreak, most of the nation is sheltering in place, and only essential businesses remain open. Even just a few months ago, if you had mentioned “global pandemic,”...more

Ballard Spahr LLP

How to Be Ready for Coronavirus-Related Cybersecurity Challenges

Ballard Spahr LLP on

The novel coronavirus outbreak is creating electronic communication and data privacy concerns on a number of fronts. One immediate effect is a significant increase in phishing scams, used by threat actors to launch malware...more

Ballard Spahr LLP

Hackers Capitalizing on Coronavirus

Ballard Spahr LLP on

As people across the country and world try to figure out how to protect themselves against the spread of coronavirus, hackers are working hard to spread their own viruses....more

69 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide