Compliance Tip of the Day: Rethinking Corporate AI Governance Through Design Intelligence
Julie Mortimer of Mills & Reeve on The Right Way to Kickstart Your CRM Strategy - Passle's CMO Series Podcast EP176
Compliance Tip of the Day: COSO Governance Framework: Part 4, Culture
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Bar Exam Toolbox Podcast Episode 318: Quick Tips -- The Final Two-Week Bar Exam Countdown
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
Work This Way: An Employment Law Video Podcast | Episode 51: Smarter Recruiting Strategies with Rhiannon Poore of Forge Search
California Employment News: Creating the Report for a Workplace Investigation – Part 4 (Featured)
Compliance Tip of the Day: Assessing Internal Controls
Compliance Tip of the Day: COSO Objective 5 – Monitoring Activities
Compliance Tip of the Day: COSO Objective 3 – Control Activities
Compliance Tip of the Day – COSO Objective 1 – Control Environment
Hiring Smarter: Best Practices for Interviews: What's the Tea in L&E?
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Compliance Tip of the Day: Code of Conduct as an Internal Control
California Employment News: Gathering Information in a Workplace Investigation – Part 2 (Featured)
Compliance Tip of the Day: Risk Assessments and Internal Controls
FCPA Compliance Report: The Role of Culture and Data in Fraud Risk Management - A Conversation with Vincent Walden
Compliance Tip of the Day: Podcasting for Compliance Training
Compliance Tip of the Day: Compliance Training Frequency
In June 2025, cybersecurity researchers discovered a leak of 16 billion passwords in one of the largest data breaches ever, impacting a wide range of platforms and placing billions of users’ information at risk. This incident...more
I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more
In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more
Report on Patient Privacy 21, no. 7 (July, 2021) - Mayo Clinic is facing three lawsuits from patients who say a former surgery resident, Ahmad Alsughayer, viewed hundreds of their nude photographs in electronic health...more
Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more
Sometimes a comprehensive overview is needed to recognize that individual anomalous conduct is indicative of a criminal scheme. Recently, the Department of Financial Services (DFS) looked at an unusual pattern of interaction...more
To assist utilities with assessing and responding to cyber risks, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) recently issued a report on best practices to...more
Several federal agencies have teamed up to warn healthcare employers of the increased threat they face as a result of malicious cybercriminals aiming to take advantage of the pandemic to wreak havoc on their operations. The...more
On October 28, 2020, a coalition of US government entities consisting of the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more
Compliance Today (July 2020) - An April 14 survey conducted by Gartner of 145 legal and compliance leaders found that more than half of the respondents rated cybersecurity and the possibility of a data breach as the...more
With the COVID-19 related increase in remote work, anxious employees are being increasingly targeted by cyber criminals and hackers with phishing scams, business e-mail compromise schemes, and malicious ransomware. At the...more
As companies transition to employees working from home during the current COVID-19 related disruptions, cyber criminals look at these changes as huge opportunities. In the last week alone, there have been numerous...more
The spread of the novel coronavirus has upended Americans’ lives in a matter of months. While life outside has ground to a standstill in many regions of the country, much of corporate America is meeting the unique challenges...more
More and more companies are experiencing crippling data breaches. The statistics make for depressing reading. According to IBM Security’s Cost of a Data Breach Report 2019, the average cost of a data breach is $3.9 million...more
Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents. - When news events or business initiatives turn...more
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night. ...more
Imagine this scenario: you’ve had a productive and mutually advantageous ongoing contractual relationship of several years with another party. You have built up quite a bit of trust over the years, and communicate regularly...more
For several years now, we’ve been alerting employers about the dangers of phishing scams that attempt to obtain private and personal information from employers... Many of these scams rear their ugly head around tax season,...more
• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more
Data breaches continue to be an unfortunate risk that companies face with increasing frequency. In this podcast, Rebecca Bennett, Stephen Riga, and Justin Tarka discuss data breaches from both a U.S. and EU perspective,...more
According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more
October has been designated National Cyber Security Awareness Month by the Department of Homeland Security, and in the first week of the month we are focusing on developing good cybersecurity habits in our most personal...more
Best Practices to Detect and Prevent File-Less and Click-Less Malware - Hackers are clever at exploiting weaknesses in an organization’s systems. They are also efficient. After an organization installs robust cybersecurity...more