Compliance Needs are Alive and Well: FTC's Recent Enforcement Activity
Excessive Compensation: What to do when the co-owners of your business pay themselves excessively
Deposit Account Litigation: Highlights From 2024 and What to Expect in 2025 — The Consumer Finance Podcast
Recognizing and Avoiding Trademark Scams and Hoaxes
Elder Abuse-Financial Exploitation and Fraud
Legally Qualified: Protecting Against Elder Investment Fraud and Exploitation
Digging Deeper, Episode 1: The Con Queen of Hollywood
What is Consumer Fraud and What Deceptions are Employed?
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more
The continued growth of the market for nonfungible tokens (NFTs) in 2022 has helped shape the zeitgeist of what has been referenced colloquially by some as the “fourth industrial revolution,” defined largely by network effect...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
Our Cybersecurity Preparedness & Response Team discusses the current COVID-19 threat landscape, focusing on four major categories of threats and highlighting practical steps companies can take in response....more
On October 16, 2018, the SEC released an Investigative Report detailing recent email spoofing schemes that caused nine public companies to lose a total of nearly $100 million. Building on its February 2018 guidance about the...more
Yesterday, the SEC issued an investigative report under Section 21(a) that advises public companies subject to the internal accounting controls requirements of Exchange Act Section 13(b)(2)(B) of the need to consider cyber...more