Businesses are constantly targeted by criminals attempting to gain access to information that will allow them to fraudulently divert wire transfers. This often occurs after the criminal has conducted sufficient reconnaissance to determine who likely has an occupational role to approve or initiate wire transfers. The employee will then be targeted – often a financial executive like a Chief Financial Officer – and their email account will be compromised. But this can be prevented.Read more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
alabama anti-money laundering arkansas audit audit logging bank secrecy act biometric data bitcoin blockchain breach notification california ccpa checklist client notification colorado commission congress consumer notification cryptocurrency cybersecurity cyber threat data breach data privacy data privacy directive data privacy officer data protection officer data security delaware department of commerce department of health and human services department of transportation employment equifax ethereum ethics eu eu-u.s. privacy shield european union fbi fcc fcra federal communication federal trade commission financial firms financial fraud kill chain financial services gdpr hacking hippa identity theft illinois incidence response plan insider attacks insurance industry irs legislative alert malware managed service providers maritime cybersecurity maryland microsoft office 365 multi-factor identification net neutrality new jersey new mexico new york ninth circuit nist security controls nydfs ocabr patching personal data personal information phishing pre-breach services privacy act privacy notification ransomware rdp regulations remote desktop protocol school search warrant security posture assessment security vulnerabilities service provider agreement social engineering social media ssn statute students supreme court tax returns tennessee third party utah virginia virus washington workplace policy