10 For 10: Top Compliance Stories For the Week Ending, August 2, 2025
Data Driven Compliance: Understanding the ECCTA and Its Impact on Fraud Prevention with Vince Walden
Everything Compliance: Episode 158, The No to Corruption in Ukraine Edition
Daily Compliance News: July 31, 2025. The Forgotten Generation Edition
Daily Compliance News: July 31, 2025 the Forgotten Generation Edition
Understanding BBB Ratings: Building Trust and Mitigating Risks — Regulatory Oversight Podcast
Episode 379 -- Update on False Claims Act and Customs Evasion Liability
Data Driven Compliance: Understanding the UK’s New Failure to Prevent Fraud Offense with Sam Tate
Everything Compliance: Episode 157, The Q2 2025 Great Women in Compliance Edition
Daily Compliance News: July 22, 2025, The I-9 Hell Edition
Compliance Tip of the Day: Avoiding CCO Liability
2 Gurus Talk Compliance: Episode 55 – The From Worse to Worser Edition
Daily Compliance News: July 17, 2025, The COSO Yanked Edition
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Daily Compliance News: July 14, 2025, The Secret Business Sauce-Reading Edition
Adventures in Compliance: The Novels – The Hound of the Baskervilles: Uncovering Compliance – Lessons from The Hound of the Baskervilles
Compliance Tip of the Day: Lessons from Internal Control Failures
Adventures in Compliance: The Novels – The Hound of the Baskervilles, Introduction and Compliance Lessons Learned
Compliance Tip of the Day: Assessing Internal Controls
The hospitality industry faces mounting cybersecurity challenges as artificial intelligence (AI) enables increasingly sophisticated social engineering attacks targeting hotels, resorts, and travel service providers. Threat...more
According to Cybersecurity Dive, “Americans lost $16.6 billion to cyber fraud and internet crimes last year (2024), up 33% from the previous year. Phishing, spoofing and extortion topped the list of complaints, but investment...more
Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more
Everyone thinks they can spot a phish. Whether it is an email, SMS text, or QRish phishing, people have an overinflated view of their capabilities to detect them....more
A recent article in The Wall Street Journal highlights a case that is sadly all too familiar – a family member is in distress, and you must wire them money to help save them. Of course, as the article reveals, the family...more
A recent court case has unveiled a new level of sophistication in attacks targeting high-net-worth cryptocurrency holders. In a meticulously orchestrated scheme, hackers managed to steal more than $40 million in bitcoin from...more
Businesses are increasingly defrauded through common scams known as business email compromise scams (BEC scams) for which they do not have insurance to cover the resulting losses. Fortunately, there are easy-to-implement...more
Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more
Business owners should be aware of a new email scam circulating impersonating an intellectual property (IP) representative, containing false information, and offering trademark assistance. This nefarious email scam is sent by...more
Ask any chief information security officer (CISO), cyber underwriter or risk manager, or cybersecurity attorney about what controls are critical for protecting an organization’s information systems, you’ll likely find...more
On July 30, 2024, the U.S. EPA Office of Inspector General issued a fraud alert to bring attention to an increasing number of companies reporting that they have received fraudulent EPA Notice of Violation letters demanding...more
Phishing scams can pop up anywhere, as evidenced by the U.S. Environmental Protection Agency (EPA) Office of Inspector General’s recent alert regarding fraudulent Notice of Violation letters (NOVs)....more
The recent increase in smishing and vishing schemes is prompting me to remind readers of schemes designed to trick users into providing credentials to perpetrate fraud. We have previously written on phishing, smishing,...more
Over the years many clients have forwarded to us scam trademark mailings. These mailings come from various official-sounding sources, all of which seek money to allegedly take action regarding the client’s trademarks....more
One recent victim of scams preying on U.S. trademark filers and registrants answered a call that appeared to be from the United States Patent and Trademark Office (USPTO). It wasn’t. The target of the scam was forced to...more
Every month, Erise’s trademark attorneys review the latest developments at the U.S. Patent and Trademark Office, in the courts, and across the corporate world to bring you the stories that you should know about: Travis...more
Especially during the holi-daze, it can be easy to let our safeguards down and fall prey to scammers looking to make a quick buck. Trademark applicants and registrants interacting with the U.S. Patent and Trademark Office...more
Every year, BakerHostetler collects and analyzes various metrics about the incident response matters we handle. In 2022, we handled over 1,160 incidents. The most striking trends we saw across those incidents were an overall...more
On March 10, 2023, the US Federal Deposit Insurance Corporation took control of the assets of Silicon Valley Bank (SVB). In light of SVB’s closure, many venture firms and emerging companies are establishing new accounts with...more
With the holiday season upon us and online goods and services flying off the virtual shelves, companies should not lose sight of the increased risk of phishing and cyberattacks. Society’s reliance on online commerce means...more
Government agencies are grappling with the theft of millions of taxpayer dollars through unique fraud schemes directed at state unemployment programs. Employers often are the first to discover these schemes when they learn...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
You can always count on cyber-criminals and fraudsters to come out of the woodwork when a national crisis occurs. The COVID-19 pandemic has resulted in a multitude of criminal schemes....more
In a short span of time, we have gone from thinking about the virus as a distant concern to working remotely from home as we have been asked to help flatten the curve by social distancing. We are daily bombarded with news and...more
Risk Management Question - What precautions can law firms, along with their lawyers and staff, take when they receive an unexpected request for protected health information (PHI) from someone claiming to be a...more