<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

Risks to Law Firms from Mobile Device Usage

Posted on January 21 , 2019

Today, over 90% of lawyers use smartphones for law-related matters. Law firms have become a prime target for cyber attacks because of the valuable data they possess and their lack of security. A study done by ALM Legal Intelligence reported 22% of law firms do not have an organized plan in place if a data breach were to occur. Hackers have noticed that law firms are vulnerable in this area. Legalitprofessionals.com says for this reason, many law firms are now focusing on mobile security.

Read more »

GDPR and US Law Firms

Posted on December 17 , 2018

Earlier this year, we were all bombarded with emails informing us of the impending EU legislation around data protection and warnings of repercussions for noncompliance leading up to May 25th, 2018. As we all now know, this was the date the European Union’s General Data Protection Regulation, or GDPR, came into effect.

Read more »

Cyber Security Threats To The Financial Sector

Posted on December 10 , 2018

Cyber Security Guidelines for Financial Services

Read more »

What is the Impact of GDPR on Financial Institutions?

Posted on December 03 , 2018

The General Data Protection Regulation (GDPR) accepted on May 28th, 2018 by the EU has strengthened privacy laws concerning the processing of personal data. Businesses need to understand how this impacts them and if compliance is needed, in order to avoid potential risk.

Read more »

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted on November 13 , 2018

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read more »
Page 2 of 12 «
1 2 3 4 5