News & Analysis as of

Employee Training Email

Good2bSocial

Navigating A Cookieless Future: PPC Strategies For Law Firms in a Privacy-First World

Good2bSocial on

The world of digital advertising is always changing. Google’s recent move to delay the end of third-party cookies gives us a bit more time, but the push for better user privacy and data protection is here to stay. In this...more

McGlinchey Stafford

When Does After-Hours Work Turn into Compensable Work?

McGlinchey Stafford on

Your assistant sends you an email late in the evening (way after the 5:00 hour) and reminds you that you have an appointment in the morning. You respond: “Thanks for the reminder. Could you please make sure that I have...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Spilman Thomas & Battle, PLLC

When Even Emojis are Evidence: The Importance of Clear Written Communication

People in the workplace communicate more often and via more methods than ever before. Quite often, many of these methods of communication—emails, text messages, and instant messages on platforms like Slack or social media—are...more

Vinson & Elkins LLP

Who’s to Blame: Texas Federal Court Finds Contractual Counterparty Not Liable for Third-Party Wire Transfer Fraud

Vinson & Elkins LLP on

The facts are an oft-told business email compromise horror story: a hacker interjects themselves into an email discussion of a business deal, changes the wire instructions to their own account, and disappears with the...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Bradley Arant Boult Cummings LLP

Business Email Compromise: The Most Prevalent – and Preventable – Cyber Risk

Ransomware attacks that shut business down to zero and data breaches that disclose the personal information of customers, vendors and employees justifiably strike fear in the hearts of executives everywhere. Organizations can...more

Jackson Lewis P.C.

AI, Phishing Attacks, Healthcare, and a $480,000 OCR Settlement under HIPAA

Jackson Lewis P.C. on

Phishing has long been a favorite tactic for threat actors (hackers) to commence a cyberattack. The rapid expansion of more adaptable and available artificial intelligence (AI) technologies, such as natural language...more

Constangy, Brooks, Smith & Prophete, LLP

Top ten cybersecurity tips for organizations during the holiday season

‘Tis the season for the hustle and bustle of year-end holiday activities. With that comes the increased risk of cybercriminals exploiting the season to find vulnerabilities. This includes taking advantage of increased online...more

Jackson Lewis P.C.

Cybersecurity Awareness Month Series: Employee Cybersecurity Awareness Training

Jackson Lewis P.C. on

As Cybersecurity Awareness Month wraps up, it’s worth mentioning that employee security awareness training is an ongoing process. Employee error remains a significant contributing factor in data breaches. According to the...more

Tarter Krinsky & Drogin LLP

Be Cyber Aware

Hackers commit financial fraud by creating a fake email address mimicking the vendor’s name and emailing accounts payable saying that the vendor’s account information has been changed. Funds are then sent directly to the...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

StoneTurn

eDiscovery and Forensic Investigations: Six Tips for Managing Company Messaging Protocols

StoneTurn on

The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more

Constangy, Brooks, Smith & Prophete, LLP

As social engineering email attacks increase in sophistication, employee training and awareness rise to the forefront

The Nigerian prince seems almost quaint. Gone are the days when the Nigerian prince was the only nefarious figure menacing our inboxes. A simple yet elegant scheme – our supposed prince unexpectedly fell upon a large sum...more

Constangy, Brooks, Smith & Prophete, LLP

Business email compromise: What you can do to prevent fraud and recover funds

Fight back against this major cyber threat. Business Email Compromise is one of the greatest cyber threats to businesses of all sizes and industries, particularly those involved in regular wire transfers of funds....more

Maynard Nexsen

There's No Leaving It at the Office: Workplace Harassment When Working from Home

Maynard Nexsen on

March 11, 2021 marks one year since the World Health Organization declared the coronavirus outbreak a pandemic, and for many employees it also marks one year of working from home. According to Upwork’s “Future of the...more

Bass, Berry & Sims PLC

SEC Issues Report Warning about Fake Email Scams

Bass, Berry & Sims PLC on

On October 16, 2018, the SEC issued a 21(a) report announcing that it had investigated whether certain public companies that were victims of oftentimes unsophisticated, cyber-related frauds had violated federal securities...more

Bass, Berry & Sims PLC

Don’t Let Spoofing Fool You – SEC Says Internal Accounting Controls Should Address Cyber Threats

Bass, Berry & Sims PLC on

On October 16, 2018, the SEC released an Investigative Report detailing recent email spoofing schemes that caused nine public companies to lose a total of nearly $100 million. Building on its February 2018 guidance about the...more

Jackson Lewis P.C.

Survey Finds Healthcare Workers Understand Security Measures But Still Share Sensitive Information Through Non-Secure Email

Jackson Lewis P.C. on

According to reports on a recent survey, the vast majority of healthcare workers share sensitive medical information using non-secure email. The survey, conducted by Kickstand Communications, reportedly found that 87% of...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Littler

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

Fisher Phillips

Defending Against Social Engineering Attacks

Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

Fisher Phillips

Let's Go Phishing!

Fisher Phillips on

Emails, lots and lots of emails, filling our inboxes. Even with the best security and filters, it seems that hackers are simply building better mousetraps. The bigger problem, however, is the trusting nature of individuals...more

Foley & Lardner LLP

Health Care Employees at the Frontline in The Battle Against Ransomware

Foley & Lardner LLP on

As recent noteworthy attacks have shown, no health care organization or provider is safe from ransomware threats, and the results of an attack can be devastating. Ransomware is a virus which limits or eliminates access to...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide