News & Analysis as of

Phishing Scams Social Media Cyber Crimes

Spilman Thomas & Battle, PLLC

Decoded Technology Law Insights, V 5, Issue 3, April 2024

Using AI to Build Cyber Resilience for Critical Infrastructure - "Cyber resilience serves as a literal survival strategy, offering a framework to detect threats, understand attacks, recover swiftly, and adapt to...more

Kohrman Jackson & Krantz LLP

Don’t Take The Bait: How To Prevent A Phishing Attack

It’s late Friday afternoon and the COO of your company emails you with an urgent request to send him the HR spreadsheet you have been working on. Frantic, you immediately reply and send him the requested information. But it...more

Foodman CPAs & Advisors

Estafas Navideñas Impulsadas Por La Inteligencia Artificial

Foodman CPAs & Advisors on

El 22/11/23, la Oficina de Ciberseguridad y Protección de Infraestructura Crítica del Departamento del Tesoro de los EE. UU. publicó un Aviso que brinda consejos a los consumidores para evitar convertirse en víctimas de...more

Foodman CPAs & Advisors

Holiday Scams Propelled By Artificial Intelligence

Foodman CPAs & Advisors on

On 11/22/23, the U.S. Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection office released an advisory providing tips to consumers to avoid becoming the victim of cyber or online...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

Robinson+Cole Data Privacy + Security Insider

Health Information Sharing and Analysis Center Warns Health Systems to Be Wary of Iranian Cyber-Attacks

Following the escalation of tensions between the United States and Iran in the past week, the Health Information Sharing and Analysis Center (H-ISAC) is warning hospitals and health systems that Iran could attack health...more

Bass, Berry & Sims PLC

Privacy Perils: We're Just Not That Into You – But Criminals Are

Bass, Berry & Sims PLC on

Use of social media is pervasive, invasive, consuming, and immensely entertaining. It can also be a useful business tool on an individual and a business level. We are all also aware — or should be by now — that posts are...more

K2 Integrity

Protecting Your Digital Assets

K2 Integrity on

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines....more

Fisher Phillips

Defending Against Social Engineering Attacks

Fisher Phillips on

The term “social engineering” used to conjure up images of social scientists with Ph.D’s brainstorming ways to improve race relations or provide lower income groups with greater access to education and employment...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide