By Doug Striker bio Want to know the ugly (like, SUPER ugly) truth about how badly a dirty piece of malware could cripple your law firm? Check out the recently released spreadsheet shared by Michael Sampson. Michael calculated the impact of NotPetya on DLA Piper, including direct costs of the IT staff, and the numbers are startling. Even scarier, the numbers don't include the … [Read more...] about NotPetya: How you can prevent the next attack on your law firm
Information security
To-Dos: Your August office checklist
The middle of summer is a great time for tackling projects that you can't get to during the rest of the year. Here are a few suggestions: Ensure that data security is covered in your employee handbook, employee training, and BYOD policy. Include computer files as part of your summer office clean-up. Start planning for the last quarter of the year in terms of collections … [Read more...] about To-Dos: Your August office checklist
The Tax Man Emaileth
By Doug Striker bio You know that old saying, "The only guarantees in life are death and taxes?" To that pithy, depressing phrase, I'd like to add "death, taxes, and phishing." Yes, I believe that phishing is and will be forever a part of our human experience because criminals know we are suckers. And no matter how many people I can train and turn into savvy, … [Read more...] about The Tax Man Emaileth
The value of your personal information and how to protect it online
Technology makes it easy to connect to the virtual world around you. While an invaluable part of our lifestyle, our connected devices contain enormous amounts of personal data about us, our friends and family. This information—which includes contacts, photos, videos, location, health and financial data—is being collected by advertisers, tech companies and others, and … [Read more...] about The value of your personal information and how to protect it online
How to protect your client data while complying with PCI anti-fraud measures
What would you do if you were asked to install monitoring software on your network? Gary Allen Gardner of Rosi & Gardner, P.C. in Traverse City, Michigan, shares how he resolved a recent troubling request his firm received. We were contacted by our credit card processing company, regarding "PCI Compliance" (Payment Card Industry). By email and subsequent list of … [Read more...] about How to protect your client data while complying with PCI anti-fraud measures
How secure is your password? Are you sure?
Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, says a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to be roughly as secure as iloveyou88; one said "both are a combination of dictionary words and are appended by … [Read more...] about How secure is your password? Are you sure?
A dozen cybersecurity tips for mobile device users
The vast majority of Americans—95%—now owns a cellphone of some kind, and the percentage of Americans with smartphones has risen to 77%. Navigating the waters of security in the wake of this expansive usage of mobile devices presents serious challenges for families and businesses alike. In recognition of National Cybersecurity Awareness Month, the Illinois Bankers Association, … [Read more...] about A dozen cybersecurity tips for mobile device users
Is a false sense of confidence among your employees exposing your practice to costly phishing emails?
Intermedia, a cloud business applications provider, has released Part 1 of its 2017 Data Vulnerability Report, which examines the security behavioral habits of more than 1,000 office workers in the United States. Your employees are unknowingly granting hackers access Despite organizations educating employees about cyber threats and security best practices, office workers … [Read more...] about Is a false sense of confidence among your employees exposing your practice to costly phishing emails?
Busting 7 common information security myths
Commonly held myths about information security can lead to a potential data breach and ultimately have a big impact on a company's bottom line and reputation. However, these breaches can be avoided when businesses provide their employees with the right training and tools to separate fact from fiction and responsibly manage confidential information. A recent study shows that 23 … [Read more...] about Busting 7 common information security myths
Information Security Checklist for Small Businesses
Why you need this checklist: This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address. How this checklist helps you: This checklist will help you pinpoint your cybersecurity policy's strengths and weaknesses. How to use this checklist: Print off this checklist and review it with members of your cybersecurity … [Read more...] about Information Security Checklist for Small Businesses