<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

How Law Firms Can Identify a Phishing Email

Posted on January 25 , 2019

Experian has released its sixth annual Data Breach Industry Forecast, which highlights six key areas where companies and individuals should be aware of possible data breaches. It also singled out lawyers as specifically being easy prey to biometric, cloud and phishing cyber attacks.

The recent news of Marriott’s data breach and other headline-grabbing events show how lawyers are counseling their clients through massive data breaches. But the cyber attacks should also remind lawyers and their firms to safeguard their own technology.

Source: Legaltech News

According to The American Bar Association 2017 Security Report

"Some attorneys and law firms may not be devoting more attention and resources to security because they mistakenly believe it won’t happen to them. The increasing threats to attorneys and law firms and the reports of security breaches should dispel this mistaken viewpoint. Significantly, 22% of respondents overall reported that their firm had experienced a data breach at some time—up from 14% last year. Reports of breaches ranged from a high for firms with 10-49 attorneys (35%, more than one-third) to a low of 10% for solos."

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is a an attack via e-mail, that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

 

Read more »

Data Breach: Weak Configuration

Posted on June 26 , 2018

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection.

Read more »

Is It Time For A Network Security Audit?

Posted on June 07 , 2018

What is a security audit and how often should your company issue a routine check? Just like your annual checkup, it is wise to do the same for your network. Fairdinkum recommends that a company undergo a routine security audit once every quarter.

If you don't know where to start, start here by checking out our security audit checklist below!

Read more »

How to Identify a Phishing Email

Posted on June 05 , 2018

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

Read more »

Cyber Security Error at a New York airport

Posted on March 02 , 2017

 

A major security error left Stewart International Airport, and 760GB worth of data, unprotected for almost a year. 

Read more »
Page 1 of 1
1