Close X
Attorney Spotlight

How does Jessie Zeigler anticipate the intersection of privacy and smart technology will impact the future of litigation? Find out more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

Primary Care Providers Win Challenge of CMS Interpretation of Enhanced Payment Law

With the help and support of the Tennessee Medical Association, 21 Tennessee physicians of underserved communities joined together and retained Bass, Berry & Sims to file suit against the Centers for Medicare & Medicaid Services to stop improper collection efforts. Our team, led by David King, was successful in halting efforts to recoup TennCare payments that were used legitimately to expand services in communities that needed them. Read more

Tennessee Medical Association & Bass, Berry & Sims

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

GDPR Top 5 Actions You Should Take Now

The EU's General Data Protection Regulation (GDPR) went into effect on May 25th. As most organizations are aware, the GDPR applies not only to EU businesses but also many companies in the U.S. While the deadline is quickly approaching, most organizations are still grappling with the implications of the regulation on their business. Even if your readiness efforts are behind the curve, the GDPR Top 5 Actions You Should Take NOW will help you begin your efforts towards compliance and help mitigate your organization's risk in the short-term.

Click here to download the checklist.

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

Firm Publication

Publications

February 10, 2017

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering" to gain access to your information. By exploiting the trusting nature of people, cyber-criminals manipulate people to willingly give up confidential information such as passwords, bank information, or access to their computer's hard drive.

While there are many versions of these types of attacks, one common (and often effective) scheme is referred to as "CEO Fraud." Given the vast amount of detailed information available on a company's website, LinkedIn profile and other social media sites, a cyberattacker can carefully research an organization and identify the names of senior management. After learning specific details about a company, the attacker drafts an email pretending to be a company executive to a company employee asking for confidential information — such as an emergency wire transfer or bank account information.

CEO Fraud emails can be very convincing — using the company's jargon, logo, or sender's digital signature. Often, the email has a tremendous sense of urgency, demanding the recipient take immediate action and not tell anyone because the goal is to rush the recipient into making a mistake. Targeted attacks like these are so dangerous because security technologies like anti-virus or firewalls cannot detect or stop these attacks because there is no malware involved.

The most common clues of a social engineering attack include:

  • The email has a tremendous sense of urgency.
  • The email comes from a suspicious looking account (such as a Gmail account rather than a corporate account).
  • The sender is asking for information (such as bank account numbers or passwords) that he/she should already know or have access to.
  • The sender is pressuring the recipient to bypass or ignore established/expected security processes or procedures.
  • The communication seems odd or doesn’t really sound like the sender.

Common sense is the best defense for a social engineering attack. If something seems suspicious, it may be an attack. If you suspect someone is trying to trick or fool you, immediately stop the communication. 

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.


Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.