From Banks to FinTech: The Evolution of Small Business Lending — The Consumer Finance Podcast
From Banks to FinTech: The Evolution of Small Business Lending — Payments Pros – The Payments Law Podcast
The Authenticity Advantage: How Runbin Dong’s Scale Social AI Helps Small Businesses Shine
Innovation in Compliance: LeadHERship with Linda Fisk
CHPS Podcast Episode 5: The Future of Federal Procurement
No Password Required: Reginald “Andre” Andre, CEO of ARK Solvers and Builder of Human + AI-Driven Culture
12 O’Clock High, a podcast on business leadership: Empowering Female Entrepreneurs - A Conversation with Linda Fisk
Innovation in Compliance: Exploring the Fractional COO Model with La Tonya Roberts
Diversifying Your Contract Pipeline by Maximizing Opportunities through the DOD’s Mentor Protégé Program
How Happiness Drives Business Success: Leadership Lessons from Grace Ueng
Consumer Finance Monitor Podcast Episode: Everything You Want to Know About the CFPB as Things Stand Today, and Lots More - Part 1
SBR Author’s Podcast: Transforming Corporate Careers - Leadership Lessons for the US Military Veteran Entrepreneur
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
The Entrepreneur's Journey with Kass and Mike Lazerow
SBA’s Final Rule Is Here: Key Takeaways on Updates to HUBZone Program, Other Small Business Programs, and Various Small Business Matters
Uncovering Disparities: The CFPB's Small Business Lending Study – The Consumer Finance Podcast
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
Preparing for Major Changes to DOT’s Disadvantaged Business Enterprise DBE Program
The Force is Strong with this One – Success and Paying it Forward with Co-Founder of ChannelAdvisor and Spiffy Scot Wingo
John Neiman on the Corporate Transparency Act
On June 20, 2025, Texas Governor Greg Abbott signed SB 2610 into law, joining a growing number of states that aim to incentivize sound cybersecurity practices through legislative safe harbors. Modeled on laws in states like...more
Cybersecurity is no longer a luxury; it’s a necessity. For start-ups and established businesses alike, protecting sensitive information and maintaining customer trust relies heavily on strong cybersecurity measures. With...more
In honor of the release of the 6th Edition of the Government Contracts Compliance Handbook, we are sharing six essential tips for successfully navigating Mergers & Acquisitions (M&A) in government contracting. The...more
Originally published in American Business Magazine - May 2024. Many small- and mid-sized business owners believe that they are not prime targets for a cyber breach and that threat actors only go after large companies. This...more
Cybersecurity is a looming threat for most businesses. The impact of a major cyber event can resonate for weeks, months, and even years after the initial attack. To mitigate the risks to consumers, there have been several...more
On December 15, 2021, Congress passed the National Defense Authorization Act (NDAA or Act) for Fiscal Year (FY) 2022, which President Biden is expected to sign into law soon. As usual, the NDAA contains numerous provisions...more
Friday afternoon, reports surfaced that a foreign nation had compromised newly-discovered flaws in the Microsoft Exchange Server email software and breached the cybersecurity efforts of more than 60,000 known victims. ...more
Though we are disappointed we will not be together in-person, we remain dedicated to providing a first-class learning experience while keeping the health and well being of everyone a top priority. The ECEI will have the...more
The developing coronavirus pandemic affects businesses and personnel within the state and elsewhere. With more New Yorkers working from home, there are more opportunities for cyberattacks through unsecure remote connections...more
In the fall of last year, we wrote about the passage of the SHIELD Act (the Act) in New York, which expanded aspects of the state’s breach notification requirements (Breach Requirements) and created a statutory obligation to...more
Between 2016 and 2019, Business Email Compromise (BEC) scams cost American organizations US$3.1 billion in losses and Canadian organizations US$33.6 million. This type of pervasive scam targets large and small businesses...more
Commonsense IoT security steps that startups and small business should consider to comply with California’s new law - California recently enacted a new law, Senate Bill 327, that requires companies that make Internet of...more
Small businesses are targeted by hackers because they often do not have the resources to stay abreast of new schemes, or to protect against them with the latest technology or security solutions. Small businesses have...more
Originally published in the Upstate Business Journal on February 15, 2018. Meet Peter — a longtime employee and the backbone of your business’s day-to-day finance and accounting operations. Today he got an email from the...more
The Federal Trade Commission (FTC) has concentrated on small businesses this year with the launch of www.FTC.gov/SmallBusiness , which provides data security awareness information to small businesses. The site includes...more
The Federal Trade Commission (FTC) announced on May 9, 2017, that it has launched a new website that “helps small businesses avoid scams and cyber-attacks.”...more
I frequently get complaints from small businesses that they don’t have the resources or resilience to properly address cybersecurity and that it is overwhelming to them. Well, it is. We frequently tell businesses that...more
No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every...more
The latest publication by the National Institute of Standards and Technology (NIST), entitled “Small Business Information Security: The Fundamentals,” aims to promote and assist small businesses in their efforts to manage...more
We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more
In this presentation: - Why cybersecurity matters - Recently-implemented cybersecurity rules and laws - Rapid reporting of cyber incidents and additional cybersecurity measures coming soon -...more