Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Protect Your Firm from the Coming Cyber Storm

By Christopher Lafferty
April 01, 2023

The rise of security breaches has us all acutely aware of the importance of keeping firm and client information as safe as possible. Law firms of all sizes continue to be hot targets for cybercriminals looking for sensitive financial, personal and business data about clients and cases. Experts predict that 2023 will see more cybersecurity threats than ever before.

Fastest-Growing Threats

According to the Verizon 2022 Data Breach Investigations Report, phishing, malware and ransomware are among the top five fastest-growing security threats. The weak link is often human error, with 82% of breaches involving user errors or transgressions. Whether it is the use of stolen credentials, phishing or simply a failure to recognize a threat, human vulnerability continues to play a very large role in security incidents.

The most pervasive security threats:

  • Most phishing attacks are sent by email. The cybercriminal will register a fake domain that mimics a real company or organization and then send generic requests to trick the receiver into sharing personal information, credentials or even making a payment. Phishing emails usually come from sources that appear to be verified and reliable, such as Microsoft or Amazon. However, a closer inspection of the email address usually reveals that it's from a fake URL. Most cyberattacks begin this way, and many users are unable to recognize a sophisticated phishing email.
  • Malware is usually distributed through malicious websites, emails and software. Malware can also be hidden in other files, such as image or document files or even .exe program files. A user can unintentionally install malware by clicking on a link in a phishing email or downloading and installing software from a website that is not reputable. Malware can also be installed on a computer when the user plugs in an infected USB drive, or when the user visits a website that is infected with malware.
  • Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking files. The hackers then demand a ransom payment in exchange for a decryption key to recover the files.

Steps to Take Now

The American Bar Association 2022 Legal Technology Survey report offers a peek into the changing nature of cybersecurity threats and suggests ways your firm can strengthen cyberdefenses in 2023.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Fresh Filings Image

Notable recent court filings in entertainment law.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.