<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

What Nonprofits Need to Know About Data Backup and Disaster Recovery

Posted on February 28 , 2019

 

Read more »

Criteria for Evaluating EMM/ MDM Solutions for Nonprofits

Posted on February 25 , 2019

Enterprise Mobility Management (EMM)/ MDM

Read more »

What Law Firms Need to Know about Employees Working Remotely

Posted on January 27 , 2019

Whether you are a Principal or Partner, it should come as no surprise that law firms are a targeted industry when it comes to cyber attacks.

Read more »

How Law Firms Can Identify a Phishing Email

Posted on January 25 , 2019

Experian has released its sixth annual Data Breach Industry Forecast, which highlights six key areas where companies and individuals should be aware of possible data breaches. It also singled out lawyers as specifically being easy prey to biometric, cloud and phishing cyber attacks.

The recent news of Marriott’s data breach and other headline-grabbing events show how lawyers are counseling their clients through massive data breaches. But the cyber attacks should also remind lawyers and their firms to safeguard their own technology.

Source: Legaltech News

According to The American Bar Association 2017 Security Report

"Some attorneys and law firms may not be devoting more attention and resources to security because they mistakenly believe it won’t happen to them. The increasing threats to attorneys and law firms and the reports of security breaches should dispel this mistaken viewpoint. Significantly, 22% of respondents overall reported that their firm had experienced a data breach at some time—up from 14% last year. Reports of breaches ranged from a high for firms with 10-49 attorneys (35%, more than one-third) to a low of 10% for solos."

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is a an attack via e-mail, that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

 

Read more »

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted on November 13 , 2018

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read more »
Page 1 of 4
1 2 3 4
»