Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization.
On Sunday, more than a hundred media outlets around the world, coordinated by the Washington, DC-based International Consortium of Investigative Journalists (“ICIJ”), released stories on the “Panama Papers”, which is an exposé of private client and internal work product emails and other files. More than 5 million emails and files were stolen from within the […]
In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery.
Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence.
Have you, your staff, or a client ever sent an important email that the recipient claimed he or she did not receive? Over the next three weeks, Tech Essentials will explore common misconceptions about email delivery that will prepare you in case delivery of your (or a client’s) time-dependent email is disputed. Let’s get started […]
December 19, 2024
December 13, 2024
December 09, 2024
December 03, 2024
November 29, 2024