Skip to content

Is Proactive Cybersecurity Worth the Cost for Small and Midsized Businesses?54 sec read

When it comes to cybersecurity, the most important choice business leaders face is determining which risks to address proactively, with assessments, workforce training, policy preparation, and insurance, versus which risks to address reactively, in the form of breach remediation. Recently, our security business got a call from a mid-sized company that lost $150,000 to a […]

Our K-12 Schools Need Dedicated Safety Personnel Now More Than Ever29 sec read

Building a staffing model that brings a part or full-time crisis planning position into the K-12 organizational structure will better protect schools. “As schools across the country continue to struggle with increased threats of violence, we need to recalibrate our thinking about the time, resources, and specific skills required of those responsible for future school […]

Social Engineering: A Current Threat with A History Stretching Back to Ancient Greece5 min read

While technology is growing ever more sophisticated, the basic human emotions of greed, fear, curiosity, loneliness, helpfulness, and group solidarity stay the same over millennia. These emotions leave us vulnerable to manipulation. Indeed, we’ve been falling for scammers who use social engineering techniques to lure us into helping them achieve their unscrupulous aims since the […]

Who’s Collecting Your Employees’ Unemployment Benefits?5 min read

Recently, we have seen a rise in the hacking and fraudulent exploitation of HR data. In particular, the personally identifiable information (PII) of employees, stored by HR, has become a frequent target of cybercrime. While there are several ways in which PII can be used to scam both businesses and employees, one of the most […]

Anatomy of a Business Email Compromise4 min read

Cybercriminals steal billions of dollars from small businesses every year, and one of their favorite methods is the business email compromise (BEC), a sophisticated way to divert funds from legitimate business-to-business transfers. A Common Example of How BEC Works A prevalent form of BEC starts with an employee’s email account being hacked. Once inside that […]

What Keeps Philadelphia Law Firm Leaders Up at Night? Circumventing Practice Management Land Mines in Small & Mid-Sized Law Firms3 min read

03-16-23Seminar_Square

This seminar, focused on practice management land mines in small and mid-sized law firms and how to circumvent them, will feature three segments. Presentations and speakers will include: Management “Land Mine” #1: Workplace Security  Management “Land Mine” #2: Protecting Data & Avoiding Disqualification Management “Land Mine” #3: Handling Crisis Communications CLE is approved in NY, […]

You’ve Been Breached – Who Do You Call?59 sec read

cyber podcast graphic

On Cozen O’Connor’s Cyber Law Monitor podcast, host Andrew Baer is joined by Matthew Klahre from Cozen O’Connor’s Technology, Privacy & Data Security practice group for a discussion, with practical tips, on how to manage internal and external communications following a data breach. Forensic investigators, like COSECURE Cybersecurity, are a critical party in the investigation or remediation […]