FCPA Compliance Report-Episode 408, Brad Davis on Social Engineering for Data Protection
At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more
Today on Don’t Take No for an Answer, Lynda A. Bennett and Eric Jesse discuss the stealth disappearance of social engineering and fraudulent instruction coverage, and what you can do to make sure you have insurance coverage...more
Applying North Carolina law, a federal district court has held that an E&O insurance policy does not provide coverage for loss arising from social engineering fraud despite the fact that the insured’s negligence also...more
Social engineering scams seeking to deceive companies into making wire transfers to fraudulent bank accounts continue to plague companies. According to the FBI, social engineering fraud costs businesses billions of dollars...more
The Situation: Businesses are increasingly at risk of social engineering crimes, and often their commercial insurance policies do not provide the full protection that they expected. The Result: Three recent decisions...more
The Sixth Circuit recently entered a ruling in American Tooling Center, Inc. v. Travelers Casualty and Surety Co. of America, 2018 WL 3404708 (6th Cir. July 13, 2018), soundly rejecting a cyber carrier’s extremely narrow...more
As the number and sophistication of social engineering attacks increases, victims are examining their insurance policies to see if they are covered. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB...more
In this month's edition of our Privacy & Cybersecurity Update, we discuss the Article 29 Data Protection Working Party's critique of the Privacy Shield and the Sixth Circuit's decision to consider the issue of computer fraud...more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
We live in an age of escalating cybersecurity threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization's computer systems via its personnel and not a hack to the computer...more