Skip to content

Announcing Transitions for COSECURE and Margolis Healy and Associates3 min read

Today, Cozen O’Connor announces a transition for two of its ancillary businesses, Margolis Healy and Associates and COSECURE. For decades, Margolis Healy has been a market leader specializing in safety, security, emergency preparedness, and regulatory compliance for communities and workplaces across industries, with a strong focus on K-12 and higher education. Acquired by Cozen O’Connor in 2017 as […]

Who’s Collecting Your Employees’ Unemployment Benefits?5 min read

Recently, we have seen a rise in the hacking and fraudulent exploitation of HR data. In particular, the personally identifiable information (PII) of employees, stored by HR, has become a frequent target of cybercrime. While there are several ways in which PII can be used to scam both businesses and employees, one of the most […]

Anatomy of a Business Email Compromise4 min read

Cybercriminals steal billions of dollars from small businesses every year, and one of their favorite methods is the business email compromise (BEC), a sophisticated way to divert funds from legitimate business-to-business transfers. A Common Example of How BEC Works A prevalent form of BEC starts with an employee’s email account being hacked. Once inside that […]

What Keeps Philadelphia Law Firm Leaders Up at Night? Circumventing Practice Management Land Mines in Small & Mid-Sized Law Firms3 min read

03-16-23Seminar_Square

This seminar, focused on practice management land mines in small and mid-sized law firms and how to circumvent them, will feature three segments. Presentations and speakers will include: Management “Land Mine” #1: Workplace Security  Management “Land Mine” #2: Protecting Data & Avoiding Disqualification Management “Land Mine” #3: Handling Crisis Communications CLE is approved in NY, […]

You’ve Been Breached – Who Do You Call?59 sec read

cyber podcast graphic

On Cozen O’Connor’s Cyber Law Monitor podcast, host Andrew Baer is joined by Matthew Klahre from Cozen O’Connor’s Technology, Privacy & Data Security practice group for a discussion, with practical tips, on how to manage internal and external communications following a data breach. Forensic investigators, like COSECURE Cybersecurity, are a critical party in the investigation or remediation […]