The ongoing breach affecting thousands of organizations that relied on hacked products by network software firm SolarWinds may have jeopardized the privacy of countless sealed court documents on file with the U.S. federal court system, according to a memo from the Administrative Office (AO) of the U.S. Courts.
Read More
Topics:
cybersecurity,
Hacking,
Information Security
Everyone needs to know what to do in the event of a successful cyberattack.
Read More
Topics:
Security,
Training,
Technology Consulting,
cybersecurity,
Ransomware,
FBI Internet Crime Complaint Center,
US-CERT,
IC3,
Secret Service,
PII,
Federal Trade Commission,
Cybercrime,
Publications,
Articles,
Information Security
Law firm cybersecurity continues to evolve. This is more than just a technology issue or an added clause in the retainer agreement—it’s one of the biggest risks that law firms will face in 2019. Cybersecurity is part of doing business, and pressure from clients is causing firms to invest and focus more on cybersecurity and its concomitant risk management.
Cyberattacks have become so frequent that it is no longer a matter of whether firms will be the victim of a cyberattack, but a question of when and to what extent. This is a result of easily accessible malware and increasingly sophisticated cybercriminals. It is no longer enough to relegate cyber-risk management to the IT department and it requires more than a general guideline on computer use. These prevalent threats are changing the entire IT ecosystem, including documents, websites, emails, servers, cloud applications and mobile devices.
In this webinar, attendees will hear from a panel of law firm professionals, information security experts and IT professionals who will discuss the current security landscape at law firms. The discussion will cover law firms' responsibility to manage cybersecurity, including risk management, potential future threats and steps firms should take today to ensure the security of their firms' and clients' data. The panel will also briefly highlight current security legislation and regulation highlights.
During this moderated discussion, attendees will learn:
• The state of law firm data security today
• The biggest cybersecurity risks for law firms
• What to do to manage cyber risk
• How to recognize a cyberthreat
• The lawyer’s cyber standard of care
• Increasing client requirements of law firms
• How to avoid cybersecurity legal malpractice claims
Read More
Topics:
Webinars,
cybersecurity,
Cybercrime,
Information Security,
David Lam,
Michael Kemps,
Citadel Information Group
Recent research has shown changes in the effectiveness of various phishing attacks.
Cofense, previously PhishMe, issued a report based on 1,400 clients in 23 industries in more than 50 countries that notes that 7.5 million phishing emails were reported in 2017 alone. But the effectiveness of phishing campaigns has shifted.
In prior research, users were most emotionally motivated to open emails that made them feel a sense of urgency, fear or opportunity. Those three emotional motivators have now been replaced with entertainment, social and reward/recognition.
Read More
Topics:
Security,
Training,
cybersecurity,
Ransomware,
Hacking,
phishing,
Cybercrime,
Email Security,
Information Security
A recent ransomware attack against the city of Atlanta took its computers offline for over a week while city officials, along with the FBI, attempted to remedy the situation without paying the hackers $51,000 in Bitcoin.
Read More
Topics:
cybersecurity,
Ransomware,
Cybercrime,
Email Security,
Information Security
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Read More
Topics:
Security,
Training,
Malware,
Information Governance,
Email Management,
Network,
Access Control,
Mimecast,
Dual Factor Authentication,
whaling,
cybersecurity,
Passwords,
Biometric Authentication,
Two Factor Authentication,
Ransomware,
Hacking,
Advanced Persistent Threats,
phishing,
Antivirus,
Cybercrime,
Enterprise Mobility Management,
Mobile,
Email Security,
2FA,
Information Security,
Penetration Testing,
Vulnerability Testing,
firewall
We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses.
Read More
Topics:
Security,
Alerts,
Email Management,
cybersecurity,
Hacking,
phishing,
Cybercrime,
Email Security,
Information Security,
Identity Theft
Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognize. The cyber thug behind the message made a myriad of threats – including physical harm to district students and staff and releasing their personal information – unless a ransom was paid in Bitcoin. The community was thrust into a panic, and the district closed its 30 schools for three days. Was this response warranted or appropriate?
Read More
Topics:
Information Governance,
cybersecurity,
Ransomware,
Cybercrime,
Information Security
Many thanks to our friends at iManage for sharing this blog post.
by Aaron Rangel, Director Product Marketing, iManage
The secret is out: professional services firms make attractive targets because they have large volumes of privileged client information. High profile cyber-attacks such as the Panama Papers incident have made information security a top priority at the C-level executive suite.
Read More
Topics:
iManage,
Information Governance,
cybersecurity,
Information Security
If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies.
Read More
Topics:
cybersecurity,
Cybercrime,
Information Security
Comment on this post