Cybercriminals are continuing to exploit human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is demanded, finds the Verizon 2016 Data Breach Investigations Report. This year's report highlights repeating themes from prior year's findings and storylines that continue to play off … [Read more...] about Cybercrime and 7 basic security measures your firm should take now
Information security
Buried by paper? Time to crawl out and go digital
In a report dated August 9, 2012, Linda A. Halliday, the Assistant Inspector General for Audits and Evaluations of the Department of Veterans Affairs, called for immediate action to address the “Risks Associated with Veterans Claims Folder Storage, Building Integrity, and Employee Safety at the Winston-Salem VA Regional Office.” In her report, Ms. Halliday described thousands … [Read more...] about Buried by paper? Time to crawl out and go digital
Cyber security report uncovers why most corporate network breaches occur on Monday morning, and more
CYREN, a cyber security platform, recently announced the release of its latest CYREN Cyber Threat Report that examines trends surrounding malware, phishing, spam and other online threats. Friday malware spike results in busy Mondays for IT security professionals In the report, CYREN research confirms long-held suspicions that criminals are purposely intensifying their … [Read more...] about Cyber security report uncovers why most corporate network breaches occur on Monday morning, and more
How document automation can save you thousands
Does your firm use document automation tools? If not, you’re not alone. According to a survey conducted in 2013 by the International Legal Technology Association, a whopping 62% of law firms surveyed reported not using a document automation system. But when you think about how much time your team spends assembling variations of the same documents every day, automating the … [Read more...] about How document automation can save you thousands
Get your firm ready for any kind of disaster at free National Preparedness Month webinar series
Are the members of your firm prepared to communicate quickly and effectively with each other when a crisis hits? Did you know that nearly 70 percent of all U.S. businesses will lose power at one point in the next 12 months? Do you have a plan in place to keep your operations running? How will you rebuild your business if your employees are unable to report to work after a major … [Read more...] about Get your firm ready for any kind of disaster at free National Preparedness Month webinar series
Are you changing your security strategy?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that's challenging for even the best prepared organizations, according to new research recently released by CompTIA, the IT industry association. "It's not that businesses need to be convinced that … [Read more...] about Are you changing your security strategy?
How to protect your data against costly and destructive cyber attack
Who is hacking into law firms? Are you at risk? How do security breaches happen? How to protect your data The downside of smartphones Planning for a breach At the law offices of Florrick, Agos & Lockhart, partner Diane Lockhart opens an email from a colleague and clicks on a link. As soon as she does, all the computers in the office go dark and a message pops up on … [Read more...] about How to protect your data against costly and destructive cyber attack
How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Get the presentation materials here Join our presenters Sharon D. Nelson, Esq., President, Sensei Enterprises, Inc. and John W. Simek, Vice President, Sensei Enterprises, Inc. and our moderator Catherine Jones, Editor of Law Office Manager as they discuss the rise in cyber crime, what it is, and how it is affecting your law firm. Here is just a sample of what they … [Read more...] about How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Leaky password managers on Android
By John Simek bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android
The opportunities, concerns, and challenges related to adopting cloud services
According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services