<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

What You Need to Learn from the Biggest Data Breaches in 2018

Posted by Keith Shaffer Mar 8, 2019 3:58:58 PM

 

Read More

Topics: Security Training and Awareness, Data Breach, Data Protection

How Law Firms Can Identify a Phishing Email

Posted by Keith Shaffer Jan 25, 2019 12:49:20 PM

Experian has released its sixth annual Data Breach Industry Forecast, which highlights six key areas where companies and individuals should be aware of possible data breaches. It also singled out lawyers as specifically being easy prey to biometric, cloud and phishing cyber attacks.

The recent news of Marriott’s data breach and other headline-grabbing events show how lawyers are counseling their clients through massive data breaches. But the cyber attacks should also remind lawyers and their firms to safeguard their own technology.

Source: Legaltech News

According to The American Bar Association 2017 Security Report

"Some attorneys and law firms may not be devoting more attention and resources to security because they mistakenly believe it won’t happen to them. The increasing threats to attorneys and law firms and the reports of security breaches should dispel this mistaken viewpoint. Significantly, 22% of respondents overall reported that their firm had experienced a data breach at some time—up from 14% last year. Reports of breaches ranged from a high for firms with 10-49 attorneys (35%, more than one-third) to a low of 10% for solos."

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is a an attack via e-mail, that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

 

Phishing Email Cybersecurity Training Fairdinkum
Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Phishing

Data Breach: Weak Configuration

Posted by Gabrielle D'Andrea Jun 26, 2018 11:34:24 AM

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection.

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Malicious Software, Data Breach, Data Protection

Is It Time For A Network Security Audit?

Posted by Gabrielle D'Andrea Jun 7, 2018 12:28:31 PM

What is a security audit and how often should your company issue a routine check? Just like your annual checkup, it is wise to do the same for your network. Fairdinkum recommends that a company undergo a routine security audit once every quarter.

If you don't know where to start, start here by checking out our security audit checklist below!

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety

How to Identify a Phishing Email

Posted by Gabrielle D'Andrea Jun 5, 2018 10:00:00 AM

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Phishing