It's happened. You've done everything you can to defend your law firm from this day, but the hacker successfully breached your walls. Now, you're faced with encrypted files, lost confidential data, demands for money, the insertion of other forms of malware on your network or, even worse, some combination of these and/or more malicious activities or demands.
What do you do now? Who needs to know? Who are you gonna call?
Read More
Topics:
Security,
Training,
Malware,
IT Tips,
Email Management,
whaling,
cybersecurity,
Hashcat,
Passwords,
Hacking,
phishing,
Virus,
Antivirus,
FBI Internet Crime Complaint Center,
US-CERT,
IC3,
Secret Service,
PII,
Federal Trade Commission,
APTs,
Cybercrime
Ransomware, in layman’s terms, is designed to extort money from law firms, companies and individuals by holding their data hostage. CryptoLocker (and its variants) is a type of ransomware that infects a computer and seeks out common data files, such as pictures, music, PDFs and Word and Excel documents. It then encrypts those files so the user can’t open them, leaving the victim two choices: pay the cybercriminal or lose the data.
Need an example? Check out what happened to the Town of Discovery Bay, Calif., when its network was compromised by CryptoLocker.
Unfortunately, it only takes one wrong click to become a victim. Thus, ransomware prevention is crucial for law firms of any size holding confidential information. And what law firm isn't?
Download and use our 10 Steps to Ransomware Prevention:
A Checklist for Managing Computer Vulnerabilities to help ensure your law firm can survive a ransomware attack.
Read More
Topics:
Security,
Training,
Malware,
IT Tips,
Webinars,
whaling,
cybersecurity,
Passwords,
Ransomware,
Hacking,
phishing,
Virus,
Antivirus,
Endpoint Protection,
APTs
One click. That's all it took. One single click.
All the law firm's data. All of it. Gone. Encrypted. Corrupted. The best you can hope for is that you get
Read More
Topics:
Security,
Training,
Malware,
IT Tips,
Webinars,
whaling,
cybersecurity,
Passwords,
Ransomware,
Hacking,
phishing,
Virus,
Antivirus,
Endpoint Protection,
APTs
As we wrap up this series of Law Firm Cybersecurity Tips, remember that we're always keeping an eye out and keeping you up-to-date on new threats to your law firm. For our final post in the series, we'll discuss a very dangerous threat to law firms.
A highly destructive — to information as well as physical security — threat is the Advanced Persistent Attack (APT).
These threats come in several different forms. They are stealthy and determined in their attempts to compromise data. They can be simple, such as a rogue administrator account hiding in an obscure organizational unit in your Active Directory (you are checking who has membership to domain administrative and enterprise administrators, right?), ranging to the better-known Trojan-horse attacks. Some of these viruses sit on your computer or server silently collecting your data for months.
The Stuxnet computer worm is a famous example. While this threat was originally intended to target Iran’s nuclear capabilities, hackers discovered the source code and re-engineered it to use against individuals and corporations.
Read More
Topics:
Security,
Malware,
IT Tips,
Network,
SentinelOne,
cybersecurity,
Advanced Persistent Threats,
Endpoint Protection,
APTs
Comment on this post