-
Not finding what you're looking for? Try another search.
-
Ransomware Guide
…services can be the origin of a security incident, such as a ransomware infection. Types of Ransomware From minor to major importance, we can classify ransomware in general into: Hoax…
-
What is Ransomware?
…each of us. More reading: Cybersecurity and Infrastructure Security Agency’s ransomware guide: https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C_.pdf National Institute of Standards and Technology’s ransomware risk management: https://csrc.nist.gov/publications/detail/nistir/8374/draft PC Magazine’s protection recommendations: https://www.pcmag.com/picks/the-best-ransomware-protection ABOUT THE…
-
Ransomware
What Is Ransomware? Ransomware is a type of malicious software (malware) that is designed to hold your files or computer hostage, demanding payment for you to regain access. Ransomware has…
-
DOJ on Ransomware
…of ransomware and the global impact. Learn how ransomware works from stage 1 (infection) to stage 3 (laundering payment). Learn about law enforcement’s response to ransomware as well as the…
-
Don’t Let Ransomware Hold Your Firm Hostage
…to effectuate, but is devastating for the target. This is the M.O. of the “ransomware” attack. “Ransomware” is a special kind of malware (software designed to do damage to or…
-
Ransomware – Protect Your Data or Pay the Price
Course Number 5266 CLE Approved for 1.0 hours of General CLE Credit including 1.0 hours of Technology or 1.0 hours of Ethics Description The number of ransomware attacks is growing,…
-
Prominent Sacramento law firm sues for $1 million after falling prey to ransomware attack [Guest Post]
…more than $1 million alleging that, after hiring the company to provide cybersecurity, the law firm was hit with a ransomware attack. The Mastagni Holstedt law firm filed the suit…
-
Cybersecurity & Infrastructure Security Agency (CISA) Resources [Guest Post]
…detection to containment and eradication. Ransomware Response Checklist The #StopRansomware Guide serves as a comprehensive resource for organizations to mitigate the risk of ransomware incidents by employing best practices for…
-
Holidays and Weekends: Prime Time for Cyberattacks [Guest Post]
…longer the delay. They also lose more money because of those attacks, which are primarily ransomware attacks. The root of the problem is that so many victims are understaffed on…
-
Stop That Malware
You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber…
-
Reducing Litigation and Liability Risk for Attorneys
…protect client data and then dive into a discussion of the most common cyber-threats to attorneys and their clients including ransomware, phishing schemes, man-in-the-middle and Business Email Compromise (BEC). Attorneys…
-
Law Firm Computer System Security [Guest Post]
…loses data at some time. Law firm servers, hard drives, phones, and cloud centers may fail or be hacked at any time. Ransomware could hold your files hostage or infiltrators…
-
Embracing Technology and Protecting Client Data from Your Office to Your Home
…challenges that arise Law firms are prime targets for hackers Cautionary tales & Ransomware examples Two approaches to protecting client data SPEAKER BIO(s) Halley Peters is a licensed Florida attorney…
-
Introduction to Cybersecurity: Awareness & Prevention
…provide answers to the following questions: 1) What is Ransomware and how has it evolved over the last few years? 2) What if I Pay/Don’t Pay OFAC (Office of Foreign…
-
Demystifying Cybersecurity for Law Firms
…Learn which initiatives firms can implement to improve security. Discover the specific steps that can help you protect your firm from ransomware, phishing, stolen credentials, and even legal malpractice relating…
-
All Those Tech Questions You’ve Been Afraid to Ask
…Resources How long should I keep closed files? Ethics Informational Packet on Closed Files Cybersecurity & Data Breaches LegalFuel Cybersecurity Resources Phishing Ransomware Selected Data Privacy Laws Outline Companion Quick…
-
Fraudulent Email Alert with the Subject “The Office of The State Attorney Complaint”
…click on any links contained within the email and to delete it immediately. It is suspected that this email contains a link to a malicious software known as Ransomware. The…
-
Cyber Protection for Law Firms [Guest Post by Member Benefits, Inc. and Coalition]
…You are just one funds transfer fraud, ransomware, or email compromise away from exposure. Coalition provides the most comprehensive security and insurance that you need. Click Here to Learn More…
-
Why Utilizing Practice Management Software Could Be the Most Important Decision You Make at Your Firm
…for hackers to access your documents or hold your firm hostage with ransomware. In an excellent ABA article entitled Clearing Up the Cloud, the author explores precautions attorneys must consider…
-
What You Need To Protect Your Firm From Cyber Threats [Guest Post]
…this fact more clearly than 2017 which saw increasingly unique and sophisticated cyber attacks such as the ransomware WannaCry attack that was responsible for crippling computers over a span of…
-
Fraudulent Email Alert – November 30, 2016
…click on any links contained within the email and to delete it immediately. It is suspected that this email contains a link to a malicious software known as Ransomware. The…
-
Helping Others Secure Themselves
…attacks (like ransomware). Make sure family and friends have an automated file backup system in place. Often, the simplest solutions are Cloud-based. They back up your devices hourly or whenever…
-
Ethical Obligations – What Must Lawyers Do to Maintain Privileged Information and Comply with Applicable Regulations?
…example, ABA Formal Ethics Op. 95-398[5] (1995); Florida Ethics Op. 12-3[6] (2013). P. Weak passwords for personal devices Q. Multi-factor authentication (MFA) is still not implemented universally R. Ransomware is…
-
Cybersecurity for Lawyers: How to Keep Your Firm’s Information Safe
Course Number 5523 CLE Approved for 1.0 hours of General CLE Credit including 1.0 hours of Technology Description Learn how to protect your firm’s most sensitive information. Cybersecurity is more…