Businesses are constantly targeted by criminals attempting to gain access to information that will allow them to fraudulently divert wire transfers. This often occurs after the criminal has conducted sufficient reconnaissance to determine who likely has an occupational role to approve or initiate wire transfers. The employee will then be targeted – often a financial executive like a Chief Financial Officer – and their email account will be compromised. But this can be prevented.
Read more »Tag: wire transfers
-
The Financial Fraud Kill Chain: Combatting Fraudulent Money Transfers Posted on: April 02, 2019 In: Data Privacy & Cybersecurity
Blog Search
Featured Posts
- December 04, 2020 Respect and Communication: Pathways to Productive and Satisfied Employees
- December 03, 2020 The Second Wave is Here – N.J. Executive Order 192 Imposes New Pandemic-Related Requirements for Employers
- November 10, 2020 California Voters Make CCPA 2.0 a Reality – California Privacy Rights Act Ballot Measure Passes
- May 29, 2020 Seventh Circuit Court of Appeals Recent Decision in Molson-Coors v. Anheuser-Busch Affirms Lesson: Choose Words Wisely
Blog Tags
accounting firms
alabama
anti-money laundering
arkansas
audit
audit logging
biometric data
bitcoin
blockchain
breach notification
business-to-business
california
ccpa
client notification
colorado
commission
congress
consumer notification
coronavirus
covid-19
cpra
cryptocurrency
cybersecurity
cyber threat
data breach
dataprivacy
data privacy
data privacy officer
data security
department of health and human services
email
employment
equifax
eu
eu-u.s. privacy shield
european union
executive order
fbi
fcra
federal communication
federal trade commission
financial fraud kill chain
financial services
fraud
gdpr
genetic information privacy act
hacking
healthcare
hhsocr
hipaa
holiday season
human resources
identity theft
illinois
information security
insider attacks
irs
legislation
legislative alert
malware
managed service providers
maritime cybersecurity
maryland
microsoft office 365
multi-factor authentication
multi-factor identification
nevada
new jersey
new mexico
new york
ninth circuit
nist security controls
personal data
personal information
phishing
pre-breach services
privacy notification
protected health information
ransomware
regulations
school
security vulnerabilities
social engineering
social media
ssn
statute
students
supreme court
tax returns
third party
utah
vermont
video-teleconferencing
virginia
virus
w2
washington
websites
workplace policy
zoom