A new cybersecurity threat has emerged. According to the FBI, “SIM swapping” attacks have increased by more than 500% recently.
Lisa built a very successful business. After several years, she brought on a partner to manage the internet technology needs. The company utilized several software programs for business development and asset management. To integrate the systems, her partner had admin access to all of Lisa’s accounts and installed hardware in her home. As a partner, he was a signer on her company bank account.
Her partner deposited company checks into his personal account for “safe keeping,” closed her credit cards and hired a good attorney. Left with no financial resources, Lisa could not hire an attorney to fight back. Her former partner opened a new office and hired most of her former employees.