Latest Posts › Cybersecurity

Share:

Ransomware: The Ghoulish Battle With New Rules – Lawyers' Lawyer Newsletter

The Business of Ransomware – A New Normal - In the first half 2021, Accenture reported triple-digit growth in cyber intrusion activity including ransomware attacks on the world's legal, accounting, and insurance industries....more

Beware of Fraudsters Posing as Government Investigators to Obtain Protected Health Information

Risk Management Question - What precautions can law firms, along with their lawyers and staff, take when they receive an unexpected request for protected health information (PHI) from someone claiming to be a...more

How to Guard Against Proliferating COVID-19 Scams

Risk Management Question - What precautions can lawyers, staff, and law firms take to avoid pandemic-related cyber scams?...more

Beware of the Latest Phone Scams

Risk Management Question - Fraudsters seeking to take your money or personal information use a variety of phone scams, including SMSishing (text-based phishing). How can you and your employees protect against phone scams?...more

'Tis the Season for Tech Support Scams

Risk Management Question - How do you recognize and protect against tech support scams? The Issue - Many will celebrate this holiday season by treating themselves or a loved one to the gift of technology. A shiny new...more

'Tis the Season for Spoofed Greetings

Risk Management Question - What steps can law firms take to guard against greeting e-card scams? The Issue - Winter is coming, and along with it, your employees may start receiving holiday e-cards on their work...more

Don't Let Hackers Have a Holiday with Your Information

Risk Management Question - As the 2019 holiday season quickly approaches, you can expect a flood of holiday-themed scams. Malicious actors are ready and waiting to exploit the goodwill of the holiday season by trying to...more

A new method to phish you—a wireless voicemail message

Risk Management Question - What can lawyers do to identify how hackers are using business tools—such as the transcription of voice messages into emails—as weapons to access law firms' systems, and how should the attacks be...more

Watch Your Domain Extensions (Who does that email REALLY come from?)

Risk Management Question - How can you tell if an email—which appears to be from within a firm's own messaging system, advising the recipient that his or her information has expired or needs to be updated, and directing...more

Protect Yourself and Your Firm Against Password Spray Attacks

Risk Management Question - What are "password spray" attacks and what cybersecurity measures do lawyers need to take to defeat them?...more

Guarding Against the Chinese Domain Name Email Scam

Risk Management Question - The Canadian Trade Commission recently issued a warning about a new email scam that involves the sender posing as a Chinese registrar company and attempting to convince the receiver that an...more

How to Guard Against Impersonation Phishing Attacks

Risk Management Question - What is an impersonation attack and what steps should you take to protect yourself and your firm?...more

Owners of Apple Devices Like iPhones Advised to Turn Off FaceTime App Until Apple Issues a Patch

Risk Management Question - How can you protect your privacy in light of a significant vulnerability recently discovered in Apple’s FaceTime App?...more

What a Famous Hip Hop Artist Can Teach About Cyber Security

Risk Management Question: The title of this Alert is not merely click bait; it’s a real life lesson about cyber security risks and how not to handle them. The fact that it involves a famous hip-hop artist should hopefully get...more

Avoid Becoming Another Hacking Statistic: A Primer on Foreign Domain Extensions

Risk Management Question: Most of my clients and contacts are located in the United States; is there an easy way to recognize emails that originate outside the U.S.? What should I do if I receive an email from a name that I...more

Avoiding Social Engineering Scams

Risk Management Question: October is cyber security awareness month. What steps are you taking to avoid common Internet scams? The Issue: Hackers and their exploits are growing more sophisticated by the day. Avoiding their...more

Your Mobile is Not Just a Phone — It's a Handheld Mini-Computer Subject to Attack

Risk Management Question: We need to stop treating our mobile phones like they're just phones. They are mini-computers more powerful than the computers that guided the Apollo 11 spacecraft to the moon and back. What common...more

Beware of Potential "Vishing" Scams

Risk Management Question: What should I do if I receive a call from my bank or a retailer about possible fraud or suspicious charges made with my credit card?...more

Personal Information is being used in a New Cyber Extortion Scam

Risk Management Question: Personal information about you is knowingly or unwittingly circulated in cyberspace every day. A new cyber extortion scam involves emails claiming to have embarrassing or incriminating information...more

Consider Resetting (or, at a minimum, Rebooting) Your Routers to Disable Latest Malware

Risk Management Question: How can law firms and businesses protect against the latest Russian-developed malware threat affecting more than 500,000 routers?...more

Cyber Alert - Dual Factor Authentication Can Be Hacked By Phishing

Risk Management Question: Dual factor authentication greatly increases your online security, but it is no panacea. Dual factor authentication can be compromised through social engineering and phishing exploits. What can law...more

Cyber Alert - Social Engineering Fraud

Risk Management Question: How can lawyers identify and avoid increasingly common social engineering scams?...more

23 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide