-
Not finding what you're looking for? Try another search.
-
Phishing
…you can take to use email safely. Phishing Phishing refers to an attack that uses email or a messaging service (like those on social media sites) that tricks or fools…
-
DocuSign Phishing Campaign
DocuSign has detected an increase in phishing emails sent to some of their customers and users – and has posted alerts on the DocuSign Trust Center and in social media. The emails…
-
Cyber Attacks: Common Email Attacks to Avoid
…phishing email to the Federal Trade Commission’s Anti-Phishing Working Group at reportphishing@apwg.org. In addition to investigating actual phishing emails, you can protect yourself and your accounts by additional security measures,…
-
Stop That Phish
…by cyber attackers. This attack method is called phishing. Learn what phishing is and how you can spot and stop these attacks, regardless if you are at work or at…
-
Ransomware Guide
…administrator privileges through deception (phishing and its variants), procedural weaknesses (i.e. failing to force changes to default usernames and passwords), software vulnerabilities or use of bad design practices such as…
-
Reducing Litigation and Liability Risk for Attorneys
…protect client data and then dive into a discussion of the most common cyber-threats to attorneys and their clients including ransomware, phishing schemes, man-in-the-middle and Business Email Compromise (BEC). Attorneys…
-
Ransomware
…a malicious link in a phishing email. Once ransomware infects your computer, it encrypts files on your hard drive – possibly even your entire hard drive – or anything else…
-
Technology Ethics for Attorneys
…can stay compliant while you’re away from the office, including privacy screens and wifi concerns Learn the dangers of email, like reply-all, BCCs, phishing scams, and sending confidential client information…
-
Investing in Legal Technology: A Talk by the Managing Partner of the Leading Legal Tech Venture Fund
…editor of Legal Theory and the Stanford Encyclopedia of Philosophy. In addition to ‘Fancy Bear Goes Phishing and The Internationalists’, he is the author of ‘Legality’ (Harvard University Press, 2011)….
-
Demystifying Cybersecurity for Law Firms
…Learn which initiatives firms can implement to improve security. Discover the specific steps that can help you protect your firm from ransomware, phishing, stolen credentials, and even legal malpractice relating…
-
Stop Important Emails from Going to Spam
…scroll to the bottom of the Gmail page. (Optional) On the left, select an organization. Scroll to the Spam, phishing, and malware and at Spam, click Configure. If the setting…
-
All Those Tech Questions You’ve Been Afraid to Ask
…Resources How long should I keep closed files? Ethics Informational Packet on Closed Files Cybersecurity & Data Breaches LegalFuel Cybersecurity Resources Phishing Ransomware Selected Data Privacy Laws Outline Companion Quick…
-
Real Estate Wire Instructions Scams
…wire requests. WARNING! WIRE FRAUD ADVISORY: Wire fraud and email hacking/phishing attacks are on the increase! If you have an escrow or closing transaction with us and you receive an…
-
Cybersecurity for Lawyers: How to Keep Your Firm’s Information Safe
…discuss: Passwords and two-factor authentication Hardware and software necessities How to prevent a phishing attack Training your staff And more! RESOURCES Slides – Cybersecurity for Lawyers: How to Keep Your…
-
Two Step Authentication in Outlook
…eliminates 91 percent of phishing attacks so multi-factor authentication is a must but choosing between the options available is difficult for most non-IT personnel. The majority of authentication utilized is…
-
Unexpected Threats to Cybersecurity/Confidentiality: The SEC and ChatGPT [Guest Post]
…in cybercrime. 71% believed ChatGPT is likely already in use by nation-states attacking other counties through hacking and phishing. Final Words After all we’ve read about misbehaving AI and AI…
-
Mind Games Cybercriminals Play with Law Firm Employees [Guest Post]
…victory for the bad guys. Hackers Using Fake Jobs in Phishing Attacks LinkedIn is now awash in phony accounts, many of them created in the last several months as a…
-
Cybersecurity for Trust Accounting
…banking account. Log into your account manually. This way you can ensure that you are accessing a secure website. Phishing emails will have links that send the user to a…
-
Protecting Privacy on Virtual Meetings [Guest Post]
…after start of meeting. Encrypting recordings is necessary and a passphrase should be used to decrypt them. Do not respond to phishing scams during or before meetings. Examples are “Your…
-
Yes, You Are a Target
…attack methods now easily bypass security technologies. For example, they often create special malware that your antivirus cannot detect. They bypass your email filters with a customized phishing attack or…
-
Helping Others Secure Themselves
…sound like them. Share examples of common social engineering attacks, such as phishing emails or the infamous Microsoft tech-support phone calls. If nothing else, make sure family members understand they…
-
Ethical Obligations – What Must Lawyers Do to Maintain Privileged Information and Comply with Applicable Regulations?
…or confidences. X. Phishing attacks via emails or attachments. Y. House counsel can take these steps to preserve attorney-client privilege for communications: Identify your role as lawyer for the company….
-
Scamming You Through Social Media
Overview Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but…
-
16th Annual National Cybersecurity Awareness Month Begins Today
…automatic updates, if you can, and protect your devices with antivirus software. Play hard to get with strangers. Cybercriminals use phishing tactics, hoping to fool their victims. If you’re unsure…
-
Phone Call Attacks & Scams
Overview When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals…
-
Personalized Scams
Overview Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase…
-
Fraudulent Email Alert Regarding Unpaid Invoices
The Florida Bar warns its members that fraudulent emails regarding unpaid invoices are being distributed. We advise members not to click on any links or attachments contained within the emails and to permanently…
-
Fraudulent Email Alert with the Subject “The Office of The State Attorney Complaint”
The Florida Bar warns its members about a fraudulent email with the subject “The Office of The State Attorney Complaint” that is being distributed. The Bar advises members not to…
-
The Human Aspect of Cybersecurity: Cautionary Tales to Mitigate Risk – Social Engineering
Course Number 4475 CLE Approved for 1.0 hours of General CLE Credit including 1.0 hours of Technology. Description Today’s technological advances allow businesses to be more efficient than ever before….
-
Scan Your Email Messages With Antivirus Software
Viruses often infect your computer via instant messages and email attachments, especially when the attachment is an executable file. Enable your antivirus software’s auto-protect feature to automatically scan email attachments…