The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Phishing

  • From Vol. 3 No.7 (Apr. 5, 2017)

    Multimillion-Dollar Scheme Serves As Backdrop for Lessons on Preventing and Mitigating Phishing Attacks

    Recent criminal charges based on a business email compromise scheme that induced two U.S.-based internet companies to wire more than $100 million to a fraudster’s bank accounts serve as a reminder that any company can fall prey to a phishing attack. Companies must ensure they are doing what they can to prevent becoming a victim. “This case shows there are few limits on the amount of money that you can potentially extract in attacks like this as long as you find a company with those kind of resources and some weakness in its financial controls,” Serrin Turner, a Latham & Watkins partner and former lead cybercrime prosecutor for the Southern District of New York’s U.S. Attorney’s office, told The Cybersecurity Law Report. With input from Turner, we discuss the facts behind the indictment and offer advice on how to prevent and mitigate damages from these types of attacks. See also “Advice From Blackstone and Tiffany CISOs on Fighting Cybercrime” (Nov. 2, 2016).

    Read Full Article …
  • From Vol. 1 No.1 (Apr. 8, 2015)

    Strategies for Preventing and Handling Cybersecurity Threats from Employees

    Not all data breaches stem from trained cybercriminals – in fact, many cybersecurity incidents come from the inside.  They are initiated by an employee’s inadvertent mistake or intentional act.  In this interview with The Cybersecurity Law Report, Holly Weiss, a partner in the Employment & Employee Benefits Group, and Robert Kiesel, a partner and chair of the Intellectual Property, Sourcing & Technology Group, at Schulte Roth & Zabel, discuss: the two categories of internal cybersecurity threats (inadvertent and intentional); specific ways to protect against those threats, including effective training methods and “bring your own device” policies; and the effect of relevant regulations.

    Read Full Article …