Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Protect Your Firm from the Coming Cyber Storm

By Christopher Lafferty
April 01, 2023

The rise of security breaches has us all acutely aware of the importance of keeping firm and client information as safe as possible. Law firms of all sizes continue to be hot targets for cybercriminals looking for sensitive financial, personal and business data about clients and cases. Experts predict that 2023 will see more cybersecurity threats than ever before.

|

Fastest-Growing Threats

According to the Verizon 2022 Data Breach Investigations Report, phishing, malware and ransomware are among the top five fastest-growing security threats. The weak link is often human error, with 82% of breaches involving user errors or transgressions. Whether it is the use of stolen credentials, phishing or simply a failure to recognize a threat, human vulnerability continues to play a very large role in security incidents.

The most pervasive security threats:

|
  • Most phishing attacks are sent by email. The cybercriminal will register a fake domain that mimics a real company or organization and then send generic requests to trick the receiver into sharing personal information, credentials or even making a payment. Phishing emails usually come from sources that appear to be verified and reliable, such as Microsoft or Amazon. However, a closer inspection of the email address usually reveals that it's from a fake URL. Most cyberattacks begin this way, and many users are unable to recognize a sophisticated phishing email.
  • Malware is usually distributed through malicious websites, emails and software. Malware can also be hidden in other files, such as image or document files or even .exe program files. A user can unintentionally install malware by clicking on a link in a phishing email or downloading and installing software from a website that is not reputable. Malware can also be installed on a computer when the user plugs in an infected USB drive, or when the user visits a website that is infected with malware.
  • Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking files. The hackers then demand a ransom payment in exchange for a decryption key to recover the files.
|

Steps to Take Now

The American Bar Association 2022 Legal Technology Survey report offers a peek into the changing nature of cybersecurity threats and suggests ways your firm can strengthen cyberdefenses in 2023.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.