5 Tips For Writing Conflict Emails
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
PODCAST: Williams Mullen's Benefits Companion - Cybersecurity Considerations for Retirement Plan Sponsors
Business Email Compromise
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Employment Law This Week®: Recalibrating Federal Agencies, Marijuana Legalization, the Changing Nature of Work - Monthly Rundown
#BigIdeas2020: NLRB’s Actions Impact Employers in 2020 - Employment Law This Week® - Trending News
[WEBINAR] Public Records Act - Taming the Email Tiger
II-29- E-Mail Curfews, the DOL’s New Self-Audit Program, Social Media Discovery, and Other Noteworthy Employment Law Trends and Developments
Day 18 of One Month to More Effective Continuous Improvement-Email Sweeps for Continuous Improvement
Polsinelli Podcast - Avoiding Professional Liability
Business email compromise (“BEC”) occurs when a payee’s business email account is compromised or impersonated. The threat actor, posing as the payee or its representative (e.g., the head of the accounting department), sends...more
The facts are an oft-told business email compromise horror story: a hacker interjects themselves into an email discussion of a business deal, changes the wire instructions to their own account, and disappears with the...more
In this episode of Decision Dive, Balch’s Jason Tompkins, Chair of Balch & Bingham’s Issues & Appeals Practice, is joined by Conrad Anderson IV, partner in the firm’s Litigation Practice, to explore the Alabama Court of Civil...more
When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks....more
Following the collapse and federal takeover of Silicon Valley Bank (SVB) on Friday, March 10, scam artists wasted no time preying on the bank’s customers. Reports have surfaced of an email scam that initially targeted...more
Anyone who owns a cellphone or uses an email address has received a communication from a scammer seeking to extract confidential information or trick the recipient into sending money to foreign countries. These attempts come...more
The United States District Court for the District of Minnesota, applying Minnesota law, has held that an insured’s loss resulting from the insured’s payment of fraudulent invoices received from a bad actor who hacked into the...more
Media outlets recently reported that Barbara Corcoran, one of the judges on the popular ABC show “Shark Tank,” was the victim of a “spear phishing” scam. See, e.g.,...more
Did you know Americans lost nearly $150 million dollars to real estate internet scams last year? That makes real estate cyber crime a greater risk to Americans than identity theft ($100 million in losses) or credit card fraud...more
In recent years, courts across the country have considered policyholder’s claims for insurance coverage for so-called social engineering losses, e.g., losses that result from a criminal tricking a policyholder into wiring...more
Fine violins do not have serial numbers, but they do typically have a label inside identifying the maker and frequently the year and location where the violin was made. Many violin makers, or luthiers[i] as they are known,...more
Electronic signature technology company DocuSign has admitted that it suffered a breach of one of its computer systems resulting in stolen data including customer and user email addresses. The breach has allowed the hackers...more
Principle Solutions Group, LLC, an information technology company, lost $1.717 million when it became the victim of a fraud scheme for which it sought coverage under the terms of a commercial crime policy issued by Ironshore...more
As the Wall Street Journal noted yesterday, banks are being deluged with phishing attacks. These attacks are especially fierce around the holiday season, when more personnel are absent and normal procedures are ignored or...more