• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Is Your Firm Secure?

Posted by William Pate

March 13, 2018 3:14 PM

  • Tweet

Hackers' methods continue to evolve. That means your security must evolve. 

To adequately protect your firm, you need:

Read More

Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall

Law Firm Cybersecurity Tips: Advanced Persistent Threats

Posted by William Pate

March 29, 2016 8:00 AM

  • Tweet

As we wrap up this series of Law Firm Cybersecurity Tips, remember that we're always keeping an eye out and keeping you up-to-date on new threats to your law firm. For our final post in the series, we'll discuss a very dangerous threat to law firms.

A highly destructive —  to information as well as physical security — threat is the Advanced Persistent Attack (APT).

These threats come in several different forms. They are stealthy and determined in their attempts to compromise data. They can be simple, such as a rogue administrator account hiding in an obscure organizational unit in your Active Directory (you are checking who has membership to domain administrative and enterprise administrators, right?), ranging to the better-known Trojan-horse attacks. Some of these viruses sit on your computer or server silently collecting your data for months.

The Stuxnet computer worm is a famous example. While this threat was originally intended to target Iran’s nuclear capabilities, hackers discovered the source code and re-engineered it to use against individuals and corporations.

Read More

Topics: Security, Malware, IT Tips, Network, SentinelOne, cybersecurity, Advanced Persistent Threats, Endpoint Protection, APTs

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (130)
  • IT Tips (89)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.