Skip to content
a person with a mask

How the New Executive Order Aims to Protect Citizens Against Cyber, Fraud, and Predatory Threats

Published
Mar 27, 2026
Topics
Share

The internet and technology have significantly expanded access to learning and social connection, but that same openness extends to those who act in bad faith. As technology becomes more powerful and more accessible, the digital environment grows increasingly difficult to navigate safely. This challenge falls hardest on vulnerable groups, such as children and older adults, as many bad-faith actors target or exploit their naivety.  

In March 2026, President Trump signed the executive order, “Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens,” into effect in hopes of reducing looming threats from hackers or exploiters.  

Key Takeaways  

Signed on March 6, the executive order focuses on protecting American citizens from cybercrime, fraud, and predatory schemes. 

The initiative emphasizes the importance of international cooperation, ongoing training, and providing victims with resources to navigate the complex digital threat environment better. 

Involved members will create a strategic action plan. This involves reviewing operational frameworks, establishing goals, and fostering collaboration among government leaders to detect, investigate, and respond to threats from Transnational Criminal Organizations (TCOs). 

What Is the Purpose of the Executive Order?  

At its core, this executive order aims to protect American citizens and their sensitive information from evolving threats. Cyber attacks, fraud, and predatory schemes are quickly reshaping the threat landscape for the worse.  

Previously, criminal actors had to break into systems, but as criminal networks grow more sophisticated, most are able to invent loopholes to acquire data. This makes it difficult to detect cyber criminals, and an increasingly looming threat for vulnerable populations as they’re susceptible to exploitation. This threat is heightened due to social engineering convenience or the accessibility to mobile devices and digital platforms  

Furthermore, most attacks are not isolated, but coordinated scams executed by Transnational Criminal Organizations (TCOs). Backed by extensive materials and large finances, these groups can extract resources from those most vulnerable through common tactics, including: 

  • Deploying ransomware and malware 
  • Phishing attempts  
  • Financial fraud  
  • “Sextortion” or other digital exploitation methods  
  • Impersonation scams 

The Action Plan: Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens 

The President, Homeland Security Advisors, the Secretary of State, and other government leaders have established a plan to set goals, responsibilities, and timelines to monitor best practices and manage the order's success.  

Within 60 days of the order, involved parties should review the relevant operational, technical, diplomatic, and regulatory frameworks to determine the best way to combat TCOs' schemes.  

Within 90 days of the order, the Attorney General should submit a Victims Restoration Program recommendation to the President. This program should serve all victims of crime to the greatest extent authorized by law through restoration, remission, or forfeiture of materials.  

Within 120 days of the order, the involved parties must submit a detailed action plan to the President based on their findings within the first 60 days. The action plan should include how to:  

  • Identify TCO responsible scams and scam centers  
  • Provide solutions to detect, investigate, and respond to TCO threats  
  • Create operational cells within the National Coordination Center  
  • This should include mechanisms to improve information sharing, operational coordination, and rapid response across the Federal Government. Operational cells should also align with established law enforcement frameworks.  
  • Foster continuous training 
  • The Director of Cybersecurity, the Infrastructure Security Agency, and the NCC should collaboratively provide training, technical assistance, and resilience building to state, local, and tribal governments.  
  • Engage international authorities or governments to enforce actions against TCOs operating within their borders.  

Digital Crime Prevention  

Right now, it’s more crucial than ever to protect your digital assets. The Federal government recognizes the importance of this endeavor, but it should not stop there. Organizations should implement technical protective and proactive measures to safeguard their digital assets. To evaluate your current cyber posture, ask yourself these questions:  

  • Were my personal information or credentials exposed in a breach?  
  • Can I confirm that I know about all past breaches that could have exposed my information? 
  • Do my employees receive proper training? Could they create vulnerabilities? 
  • Is my information being sold or exposed by data brokers?  
  • Am I in jeopardy of extortion, theft, or fraud?  
  • How does my digital life affect me?  

Navigating Securely and Safely  

Between evolving regulations and a rapidly expanding digital threat environment, it’s harder than ever for individuals and organizations to stay ahead of risks. Protecting what matters most requires not just awareness but strategic guidance to transform from complexity into clarity. 

EisnerAmper understands the pressures you face. Our cyber risk services team delivered tailored solutions and dedicated, ongoing support, to help you anticipate threats, adapt to change, and move forward with confidence. Learn how our team can support, enhance, and protect your digital environment; contact us below.  

 

What's on Your Mind?

a man in a suit and tie

Patrick A. Westerhaus

Patrick A. Westerhaus is a Partner in EisnerAmper’s Cyber Risk Services practice. With nearly 25 years of experience, he helps organizations combat cyber fraud, financial crime, and regulatory challenges through forensic and investigative expertise.


Start a conversation with Patrick

Receive the latest business insights, analysis, and perspectives from EisnerAmper professionals.