FEATURED ARTICLE
Part Three: How to Establish Quality Control
You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your law enforcement specialists. They have process documentation to follow. You’ve made it easy for Law Enforcement to know how to submit their requests. But how do you know if everyone…
Law Enforcement Response |
Part Two: A Standardized Law Enforcement Response Program
As we discussed in Part One, there are a lot of external pieces to consider when you receive ...
Read More Law Enforcement Response |
Part One: Law Enforcement Requests Overview
Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request ...
Read More Fraud Prevention |
The Real-World Value of In-Game Currency
When it comes to digital goods, Friendly Fraud isn’t the only concern merchants should have. While industry estimates ...
Read More Fraud Prevention |
Gaming Leaks 101: The How and Why
Yoda once said, “Patience you must have, my young padawan.” It is safe to say that gamers in ...
Read More Law Enforcement Response |
Data Privacy Laws and Their Contributions
The acceleration of the digital era has led to many benefits. New and exciting medical treatments are available. ...
Read More Law Enforcement Response |
Cybercrime 101: A Brief Introduction
In today’s world, cybercrime is quite common. And it's expected to continue rising at unprecedented rates. In fact, ...
Read More Brand Protection |
Building Your BEC and TSF Toolkit
Creating a playbook and devising a toolkit to address Business Email Compromise (BEC) and Tech Support Fraud (TSF) ...
Read More Brand Protection |
Threat Intelligence: Business Email Compromise Attacks
With the onslaught of spam and phishing emails impacting businesses globally, some hackers and fraud actors have started ...
Read More