Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.
For more information visit FraudEatsStrategy.com
Human Trafficking is Everyone’s Problem: Steps that Organizations Can Take to Disrupt Human Trafficking
Investigation Challenges: The More Things Change, the More They Stay The Same
Navigating the Steps of an FCPA Investigation - Part 2
Bringing Order to the Chaos: Navigating the Steps of an FCPA Investigation
The Anatomy of a Ransomware Attack - Part 2
The 3 Regulatory Mandates Banks Fear the Most: Monitorships, Lookbacks and KYC Remediations
Operationalizing Compliance
Investigations for Non-Investigators: Holding Down the Fort
Pawns, Goofs, Collaborators and Lone Wolves: An Examination of Insider Threats
Keeping Criminality Out of the Casino
Destigmatizing Whistle-Blowers: The SEC's Office of the Whistleblower 10 Years In - Best Practices for Companies in a Brave New World
The Return of the Road Warrior: What to Expect from the Resumption of Business Travel
Brazil is not for Beginners: Operation Lava Jato Part 2
Fixing Brazil: Operation Lava Jato and How it Has Forever Changed Latin America
Part 2 - A Recap of The First 30 Episodes
Fraud Eats Strategy - First 30 Episodes Recap - Part 1
Raising the Board's Compliance IQ: Meeting Increased Compliance Expectations
The Achilles Heel of FCPA Compliance: Bribe-Paying Third Parties
Chasing Bernie's Billions: Part 2
Create your
podcast in
minutes
It is Free
Mortal Musings Podcast
True Crime Investigators UK
Scaredycast
Dateline NBC
Crime Junkie