Podcast - The Role of Managed Service Providers with Stuart Itkin
Cybersecurity in Video Games & Esports
Podcast - The State of Contractor Cybersecurity with Katie Arrington
What Do the Newly Released CMMC 2.1 Documents Mean?
Overview of Cybersecurity in Government Contracts
Cyber Threats
2022 DSIR Deeper Dive: NFTs
What to Do When a Phishing Attack Happens to You - The Consumer Finance Podcast
Hybrid Workforces and Compliance with Sheila Limmroth
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
Phishing: Cybersecurity’s Biggest Threat
Jenny Radcliffe on People Hacking
Debra Geroux and Scott Wrobel on Responding to Data Breaches
No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars
#WorkforceWednesday: Extended Remote Work, Return-to-Work Manager Training, Case to Watch - Employment Law This Week®
JONES DAY PRESENTS®: AI: Security and Privacy Risks with Big Data
Zoom Security Best Practices
Cyber Insurance 101: What It Is And Why You Need It
Phishing and Vishing and Smishing (Oh my!): New Types of Scams Require Increased Vigilance
Life With GDPR: Episode 24- Phishing
Holland & Knight's Intellectual Property Group has previously reported about scams being emailed to clients claiming that if the client does not immediately act, someone else may take control of their trademark. This is one...more
Business email compromise (BEC) fraud, driven by technology and increasing sophistication by criminal organizations, has become a major issue for both consumers and financial institutions. According to a September 2024...more
Recent events highlight the need for enhanced cybersecurity protocols in government offices across the U.S. In late November 2024, the Township of White Lake in Michigan, intended to issue approximately $29 million in general...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
In an increasingly digitized world, law firms are prime targets for sophisticated cyber threats that can result in substantial financial losses and reputational damage. Recently, a prominent law firm, esteemed for its...more
Over the years many clients have forwarded to us scam trademark mailings. These mailings come from various official-sounding sources, all of which seek money to allegedly take action regarding the client’s trademarks....more
A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw...more
One recent victim of scams preying on U.S. trademark filers and registrants answered a call that appeared to be from the United States Patent and Trademark Office (USPTO). It wasn’t. The target of the scam was forced to...more
Every month, Erise’s trademark attorneys review the latest developments at the U.S. Patent and Trademark Office, in the courts, and across the corporate world to bring you the stories that you should know about: Travis...more
Especially during the holi-daze, it can be easy to let our safeguards down and fall prey to scammers looking to make a quick buck. Trademark applicants and registrants interacting with the U.S. Patent and Trademark Office...more
“Business Email Compromise Scams” or “BEC scams” typically target companies that conduct wire transfers with entities abroad. For example, a fraudster may use an email address that is very similar to that of a business’s...more
“Rejected.” Your pulse quickens as you read the letter your mother received from the IRS after filing her tax return. Someone else filed her taxes before you and collected her refund. You were hoping that money would help...more
Independent school business officers are tasked with a wide range of responsibilities, including payroll, accounting, accounts payable, investments, and facility security. Unfortunately, many independent schools are...more
You receive an email saying that due to COVID-19, a number of regularly scheduled meetings are moving to new dates and times. While hovering over the conveniently provided email link to your calendar, you notice the email...more
While electronic funds transfer is considered a convenient and quicker way to process payments and receive funds on construction projects, this practice presents significant risk to project participants. Contractual and...more
In one type of phishing, fraudsters impersonate your business when contacting consumers. Phishing victims think they’re giving information to your company — by phone or Internet —but instead give personal or financial...more