August 28, 2018 11:11 AM
May 22, 2018 12:52 PM
Recent research has shown changes in the effectiveness of various phishing attacks.
Cofense, previously PhishMe, issued a report based on 1,400 clients in 23 industries in more than 50 countries that notes that 7.5 million phishing emails were reported in 2017 alone. But the effectiveness of phishing campaigns has shifted.
In prior research, users were most emotionally motivated to open emails that made them feel a sense of urgency, fear or opportunity. Those three emotional motivators have now been replaced with entertainment, social and reward/recognition.
March 13, 2018 3:14 PM
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
February 28, 2018 2:09 PM
We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses.
February 26, 2018 12:54 PM
It's that time again — time to file your taxes early so criminals don't do it for you and steal your possible refunds. This is of special importance after the recent Equifax hack in which most Americans' personal information, including Social Security Numbers, was accessed by criminals. The most effective defense is to file your taxes early — before identity thieves have the chance to do it for you.
March 23, 2017 5:51 PM
Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhanced information security. Read the first few tips here, here and here.
March 3, 2017 3:36 PM
Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhance information security. Read the first two tips here and here.
December 22, 2016 1:05 PM
At the end of each year, the organizations publishing dictionaries release terms that will be included in their next editions. Terms that would have been nonsensical just years ago become commonplace. One word has been hiding just below the surface of our everyday conversation. It is terrifying in terms of scope and mortifying in terms of transmission. I speak of the word “ransomware.”
December 9, 2016 1:29 PM
News this week that a series of cyberattacks and data breaches at North American law firms in 2015 was worse than initially reported (isn't that always the case?) was seemingly timed with the release of a bevy of new articles and information sheets on cybersecurity by our staff.
October 26, 2016 11:58 AM
September 22, 2016 5:12 PM
We wanted to inform you of a serious security breach at Yahoo!
Earlier today, Yahoo! issued a press release stating that 500 million users' accounts were breached in a 2014 hack of their systems. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information.
Yahoo! said in the press release that:
A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network.
If you were a victim of the attack, we encourage you to review these steps you can take to file a report and help protect yourself from identity theft.
Yahoo! also recommends – as we do, too – that users take advantage of two-factor authentication to provide an extra layer of security to their Yahoo! accounts.
Yahoo! is not what we would consider a best-of-breed solution for email or other business matters. If you would like to discuss more enterprise-level, law firm standard solutions, please email email@example.com or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in-depth.
September 13, 2016 2:18 PM
Moving to the cloud is an important decision. Let our CEO Michael Kemps walk you through important security aspects of the cloud in his new article.
September 1, 2016 3:47 PM
Dropbox recently disclosed that a known 2012 cyberattack gave hackers access to 68 million users' account credentials.
Dropbox reset passwords to all affected accounts. Users should have received an email from Dropbox alerting them to this situation in recent days. We're letting you know in case you did not receive it.
Remember, cybersecurity requires that we remain vigilant on many fronts, and protect ourselves on many levels. We urge you to change your Dropbox password. In addition, change the passwords to other accounts for which you think you may have reused the same password.
Hackers were able to access data after discovering and using a Dropbox employee's password. This proves that password security is a key defense. At a minimum, it is important to regularly update your credentials with complex passwords and implement two-factor authentication.
Dropbox is not what we would consider a best-of-breed solution for sharing files. If you would like to discuss more enterprise-level, law firm standard solutions, please email firstname.lastname@example.org or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in depth.
July 26, 2016 1:31 PM
We're excited to share that our partners at the cybersecurity firm SentinelOne have announced another innovative response to the wave of ransomware attacks law firms and other organizations are facing: a Ransomware Cyber Guarantee.
Your law firm must plug the security holes remaining in your network. Anti-virus software is no longer enough.
You need next-generation endpoint security.
July 18, 2016 5:40 PM
Our partners at the cybersecurity firm SentinelOne have shared the below blog post on recent security problems with Pokémon GO. Remember to ensure your devices are secure from all threats, including those hidden within apps.
The past week has evoked an unfamiliar sight in many of the country’s public areas: Hundreds of young adults—heads down, eyes glued to their phones—wandering through public parks in search of Pokémon. In many ways, Pokémon GO represents a seismic societal shift. No other game has really captured the potential of augmented reality in a way that’s really seized the public imagination. By the same token, another seismic shift has opened up—a whole lot of people are suddenly getting an unpleasant education on the dangers of mobile malware, account privacy exposure, and GPS hacking.