Check out our founder and CEO Michael Kemps' newest article in the International Legal Technology Association's Peer to Peer Summer 2017 issue.
Check out our founder and CEO Michael Kemps' newest article in the International Legal Technology Association's Peer to Peer Summer 2017 issue.
Topics: Technology Consulting, IT Tips, cybersecurity, Endpoint Protection, Client Audits
Yesterday, shortly after our CEO Michael Kemps' article was published by the American Bar Association, the Association of Legal Administrators (ALA) released the newest issue of their magazine Legal Management. Michael has an article in it, too!
Topics: Technology Consulting, IT Tips, cybersecurity, Two Factor Authentication, Ransomware, Endpoint Protection, ALA, Cybercrime, ALA 2016, Publications, 2FA
Posted by William Pate
July 18, 2016 5:40 PM
Our partners at the cybersecurity firm SentinelOne have shared the below blog post on recent security problems with Pokémon GO. Remember to ensure your devices are secure from all threats, including those hidden within apps.
The past week has evoked an unfamiliar sight in many of the country’s public areas: Hundreds of young adults—heads down, eyes glued to their phones—wandering through public parks in search of Pokémon. In many ways, Pokémon GO represents a seismic societal shift. No other game has really captured the potential of augmented reality in a way that’s really seized the public imagination. By the same token, another seismic shift has opened up—a whole lot of people are suddenly getting an unpleasant education on the dangers of mobile malware, account privacy exposure, and GPS hacking.
Topics: Security, Malware, Technology Consulting, IT Tips, SentinelOne, cybersecurity, Ransomware, Endpoint Protection, Pokémon GO, Cybercrime, Mobile
Ransomware, in layman’s terms, is designed to extort money from law firms, companies and individuals by holding their data hostage. CryptoLocker (and its variants) is a type of ransomware that infects a computer and seeks out common data files, such as pictures, music, PDFs and Word and Excel documents. It then encrypts those files so the user can’t open them, leaving the victim two choices: pay the cybercriminal or lose the data.
Need an example? Check out what happened to the Town of Discovery Bay, Calif., when its network was compromised by CryptoLocker.
Unfortunately, it only takes one wrong click to become a victim. Thus, ransomware prevention is crucial for law firms of any size holding confidential information. And what law firm isn't?
Download and use our 10 Steps to Ransomware Prevention:
A Checklist for Managing Computer Vulnerabilities to help ensure your law firm can survive a ransomware attack.
Topics: Security, Training, Malware, IT Tips, Webinars, whaling, cybersecurity, Passwords, Ransomware, Hacking, phishing, Virus, Antivirus, Endpoint Protection, APTs
One click. That's all it took. One single click.
All the law firm's data. All of it. Gone. Encrypted. Corrupted. The best you can hope for is that you get
Topics: Security, Training, Malware, IT Tips, Webinars, whaling, cybersecurity, Passwords, Ransomware, Hacking, phishing, Virus, Antivirus, Endpoint Protection, APTs
Posted by William Pate
March 29, 2016 8:00 AM
As we wrap up this series of Law Firm Cybersecurity Tips, remember that we're always keeping an eye out and keeping you up-to-date on new threats to your law firm. For our final post in the series, we'll discuss a very dangerous threat to law firms.
A highly destructive — to information as well as physical security — threat is the Advanced Persistent Attack (APT).
These threats come in several different forms. They are stealthy and determined in their attempts to compromise data. They can be simple, such as a rogue administrator account hiding in an obscure organizational unit in your Active Directory (you are checking who has membership to domain administrative and enterprise administrators, right?), ranging to the better-known Trojan-horse attacks. Some of these viruses sit on your computer or server silently collecting your data for months.
The Stuxnet computer worm is a famous example. While this threat was originally intended to target Iran’s nuclear capabilities, hackers discovered the source code and re-engineered it to use against individuals and corporations.
Topics: Security, Malware, IT Tips, Network, SentinelOne, cybersecurity, Advanced Persistent Threats, Endpoint Protection, APTs
So what does someone need to know about the annual RSA Conference? Most technical people know about it. However, as an account executive, I felt it was important for me to understand what the acronym “RSA” stands for. In my defense, I was a first-time attendee. But I wanted to know what kind of group I’d become involved with, and I figured knowing the meaning behind the acronym would give me a pretty good idea. Now, if you’re not a real techie, you probably don’t know the answer to my question. In fact, many people I talked to didn’t know. That made me feel better. I wasn’t alone in my ignorance. I went on a personal search to find out.
Topics: Security, Training, IT Tips, SentinelOne, cybersecurity, Partners, Endpoint Protection, RSA Conference
Along with ransomware, another threat — whaling — has been dominating the news lately. While phishing has been going on for years, whaling is a slight change of direction offering greater monetary rewards for successful hackers.
In our own past experience, a law firm’s bookkeeper received an innocent-looking email from the managing partner requesting that several thousand dollars be paid from a certain account. The email looked legitimate and even came from the managing partner’s email address. But, in reality, it was a spoofed email.
The attacker faked the email address, figured out who the bookkeeper was and sent them an email pretending to be the managing partner. Fortunately, the law firm had a protocol in place for the bookkeeper to contact the controller before authorizing the payment. Had that policy not been in place, the firm would have lost thousands of dollars.
Topics: Security, Malware, IT Tips, whaling, cybersecurity, Ransomware, Hacking, phishing, Endpoint Protection
Comment on this post