Phishing attacks and other email compromise schemes are not just an annoyance in the modern workspace. A successful email compromise can allow malicious actors to intrude into an organization’s enterprise email accounts, expose sensitive data contained in users’ inboxes, and give cyber criminals the ability to successfully impersonate an employee to others within and without the organization by using the employee’s own email account.
Read more »Tag: microsoft office 365
-
Improving Your Office365 Security Posture to Stop Phishing at Email’s Shores Posted on: April 03, 2019 In: Data Privacy & Cybersecurity
-
Social Engineering Targets: Email Compromises - A Quick Prevention Guide Posted on: October 15, 2018 In: Data Privacy & Cybersecurity
More than ever before, malicious actors are targeting email platforms in an attempt to access and monetize sensitive personal information. They often gain access to email accounts through the use of social engineering – inducing unsuspecting account owners to open email attachments that contain malicious computer code (malware).
Read more »
Blog Search
Featured Posts
- February 10, 2023 Historic Hermès Jury Verdict Paves Way for Digital Trademark Rights
- January 13, 2023 Sports Law: A Year in Review & What to Watch for in 2023
- January 06, 2023 Federal Trade Commission Cracks Down on Non-Compete Agreements
- December 06, 2022 Just In Time: Last Minute Compliance Tips for the CPRA and VCDPA
Blog Tags
9th circuit
ada
america invents act
arbitration
blockchain
breach notification
california
ccpa
college
colorado
compensation
compliance
congress
consumer data
consumer notification
copyright
coronavirus
covid-19
cpra
cybersecurity
cyber threat
data breach
data privacy
data security
disability
discrimination
dol
eeoc
employee handbook
employers
employment agreements
employment law
equal pay
equal pay act
european union
executive order
family leave
fbi
fcra
federal circuit
flsa
fmla
gdpr
hacking
healthcare
hipaa
hiring
human resources
identity theft
illinois
incident response
independent contractors
infringement
inter partes review
irs
labor law
legislative alert
litigation
malware
marijuana
medical leave
minimum wage
multi-factor identification
ncaa
new jersey
new york
nil
nlrb
non-competition
osha
overtime
paga
paid leave
patent law
patents
payroll
personal data
personal information
phishing
privacy law
privacy protection patchwork
ptab
ransomware
reasonable accommodation
retaliation
sexual harassment
sports
sports law
statute
student-athletes
supreme court
title ix
title vii
trademark
trade secrets
utah
virginia
wage and hour
washington
workplace safety