Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Excessive Compensation: What to do when the co-owners of your business pay themselves excessively
Deposit Account Litigation: Highlights From 2024 and What to Expect in 2025 — The Consumer Finance Podcast
Recognizing and Avoiding Trademark Scams and Hoaxes
Elder Abuse-Financial Exploitation and Fraud
Legally Qualified: Protecting Against Elder Investment Fraud and Exploitation
Digging Deeper, Episode 1: The Con Queen of Hollywood
What is Consumer Fraud and What Deceptions are Employed?
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
We have educated our readers about phishing, smishing, QRishing, and vishing scams, and now we’re warning you about what we have dubbed “snailing.” Yes, believe it or not, threat actors have gone retro and are using snail...more
We have repeatedly warned our readers about malicious QR codes and their use by threat actors. Threat actors are now using these codes to disguise packages as gifts....more
This week, I received a fake text message (a smish) saying my E-ZPass account was overdue and that I urgently needed to pay it. That’s a new one and, apparently, quite effective. Luckily, I knew it was a scam, but others were...more
“It’s the most wonderful time of the year”—or is it? Unfortunately, it can be the most wonderful time for criminals, who try to prey on financial generosity through scams and frauds. Extra vigilance is needed during the...more
I often get asked whether law enforcement is making any headway in catching cybercriminals. Although it is a challenging task, a recent example of a big win for law enforcement deserves celebration....more
ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more
DocuSign is a great and efficient way to obtain authentic signatures for contracts and invoices. As with other efficient tools, threat actors will and have found a way to use the DocuSign API to send fake invoices to divert...more
Threat actors never miss an opportunity to use recent events to infect computer systems or quickly and easily gather personal information. The Corporate Transparency Act (“CTA”) is just such an opportunity and businesses and...more
Independent school business officers are tasked with a wide range of responsibilities, including payroll, accounting, accounts payable, investments, and facility security. Unfortunately, many independent schools are...more