Businesses are constantly targeted by criminals attempting to gain access to information that will allow them to fraudulently divert wire transfers. This often occurs after the criminal has conducted sufficient reconnaissance to determine who likely has an occupational role to approve or initiate wire transfers. The employee will then be targeted – often a financial executive like a Chief Financial Officer – and their email account will be compromised. But this can be prevented.Read more »
- June 03, 2019 CCPA’s Final Requirements in Flux, with Six Months to Go to Comply - Part 1 of 3: Where Does the Law Stand Now?
- May 23, 2019 Non-Competition Agreements – Bracing Yourself Against the Winds of Change
- May 20, 2019 Supreme Court Issues Major Ruling on the Ongoing Viability of Trademark Licenses by Bankrupt Entities
alabama anti-money laundering arkansas audit audit logging bank secrecy act bitcoin blockchain breach notification california canada ccpa client notification coast guard colorado commission congress consumer notification credit report cryptocurrency cybersecurity cyber threat data breach data privacy data privacy act data privacy officer data security department of commerce department of health and human services department of state department of transportation dmarc ebt electronic benefit transfer electronic information email employment ethereum eu eu-u.s. privacy shield european union executive order fbi fcc fcra federal communication federal trade commission financial services gdpr hacking hhsocr hipaa hippa homeland security identity fraud identity theft internet internet service provider irs legislative alert malware managed service providers maritime cybersecurity maryland meltdown microsoft office 365 money service business multi-factor identification new jersey new mexico nist framework nist security controls office for civil rights passwords patching personal data personal information phishing pre-breach services privacy notification protected health information ransomware regulations research search warrant security posture assessment security rule security vulnerabilities social engineering social media ssn statute supreme court tax returns third party utah virginia virus w2 washington