FEATURED ARTICLE

Part Three: How to Establish Quality Control

You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your law enforcement specialists. They have process documentation to follow. You’ve made it easy for Law Enforcement to know how to submit their requests. But how do you know if everyone…

Read More
online user data

Part Two: A Standardized Law Enforcement Response Program

As we discussed in Part One, there are a lot of external pieces to consider when you receive ...
Read More

Part One: Law Enforcement Requests Overview

Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request ...
Read More
gaming joystick and currency

The Real-World Value of In-Game Currency

When it comes to digital goods, Friendly Fraud isn’t the only concern merchants should have. While industry estimates ...
Read More
gamer desk

Gaming Leaks 101: The How and Why

Yoda once said, “Patience you must have, my young padawan.” It is safe to say that gamers in ...
Read More
data privacy laws gavel on keyboard

Data Privacy Laws and Their Contributions

The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. ...
Read More
cybercrime binary matrix

Cybercrime 101: A Brief Introduction

In today’s world, cybercrime is quite common. And it's expected to continue rising at unprecedented rates.  In fact, ...
Read More

Building Your BEC and TSF Toolkit

Creating a playbook and devising a toolkit to address Business Email Compromise (BEC) and Tech Support Fraud (TSF) ...
Read More

Threat Intelligence: Business Email Compromise Attacks

With the onslaught of spam and phishing emails impacting businesses globally, some hackers and fraud actors have started ...
Read More