skip to Main Content

Hackers Target Law Firms: Weak Cybersecurity Make Law Firms Irresistible To Hackers

hackers target law firms

Why do hackers target law firms? Simply put-  The weak cybersecurity of law firms make them an irresistible lucrative easy target for hackers. Not only are they a goldmine for highly sensitive corporate, financial, and personal data, but also because most firms aren’t prepared to fight off such attacks.

Hackers target law firms with a vengeance — An ALM Legal Intelligence’s cybersecurity report, 95% of corporate counsel agree that cyber-attacks are becoming more frequent. But most law firms continue to ignore the threat with nearly one-third not undergoing any formal information, cybersecurity, and privacy assessment.

Just take a look at what happened to global law firm DLA Piper, who, after proclaiming themselves experts on cybersecurity (even offering their services to affected companies through their 24/7 Rapid Response hotline) fell victim to a massive ransomware attack. Ouch.

For days, they were unable to have access to their files and had to revert to good ol’ fashioned texting to manage the law firm’s operations. And with companies losing anywhere from $300,000 to $1.7 million every hour of downtime, it’s not surprising that it’s still reeling from the attack.

Read More

Webinar Recap: Cyber Fortress – Data Protection For Your Business

Data protection webinar

Title: Cyber Fortress: How To Protect Your Data Empire
Date and Time: TUESDAY, November 13, 2018
Presenter: Michael DePalma, Channel Development Manager, Datto Inc.
Moderator: Eric Hobbs, CEO of Technology Associates

In this webinar:
  • How to safeguard your business with a secret weapon in the war on cyber extortion.
  • Simply, securely, and automatically maintain control of your business data.
  • Cyber Security Q&A on how to prevent the biggest threat to the small business community: Ransomware 
  • Real Life Check In: If your systems were struck by a disaster, how much data could you recover? How much downtime would you experience? 
  • Debunking the myths of traditional backup methods and their limitations.
  • Real “out of this world” examples of cyber threats.
  • Proactive Solutions: Business continuity, your new secret weapon in protecting your data empire.
  • How you can protect your business this holiday season.
Read More

Sextortion Scam: Aaron Smith, The Latest (Most Embarassing) Cybercrime Hacking Technique

Sextortion Scam Aaron SmithWhat we all do behind closed doors, is our business, right? This “Aaron Smith” Sextortion Scam suggests otherwise.

Imagine this (or maybe you don’t have to imagine because if you’re a business owner in the triangle area):

You open your inbox, and some guy named Aaron Smith in broken English says something to the effect of,

“Hey, I hacked into your computer while you were on adult website X, I turned on your webcam and recorded you and your screen, and if you don’t pay me $5000, I’m going to post this video on your Facebook feed and show your aunt Martha, your boss’s wife and everyone else in your world.

I have your information, I know your password is Rover050467.”

Yep. This latest scam/internet con/email phishing attack is called “Sextortion” because it’s whole tactic is based around threatening to share what you do in private to all of your peers. This one’s a doozie to say the least.

If you’re not signed up yet – attending our next webinar Tuesday November 13 from 1:00 – 2:00 PM on Cybersecurity: How To Protect Yourself And Your Business From Data Breaches is an absolute must. 

Let’s dive into this debacle of a threat so you can learn how to protect yourself from this fantastically embarrassing (and clever!) email phishing attack.

 

Read More

How Does The Recent Facebook Hack Affect Law Firms?

Facebook Hack Dangerous For Law FirmsWith Halloween this week we just couldn’t help ourselves. We had to take a look at this scary story of Facebook’s recent cyber hack of the century.  The recent Facebook hack directly compromised an estimated 50 million Facebook accounts – including those of its bigwigs Mark Zuckerberg and Sheryl Sandberg.

Add the other 40 million at-risk accounts, and it puts this breach as the largest the social networking site has ever experienced.

Read More

Goodbye FuseMail, Hello ProofPoint Anti-Spam Email Software: User-Friendly, Easy Digests

best anti-spam software for email ProofPoint Anti-Spam Email SoftwareIf you’re an existing client of ours you know we’re always evaluating our internal tools, evaluating what our clients’ experiences and refining our offerings, whether it’s a tool, a software or a service we offer.

As part of our core values, always find a way, when we find something better we’re going to make the change for the benefit of our customers.

We’ve listened to the feedback from our customers; we’re always on the cutting edge of technology offerings and in tune with our industry. Our latest upgrade to ProofPoint Anti-Spam Email Software is going to continue to ensure protection from malware, imposter emails, business email compromise (BEC) in an even easier user-friendly interface.

We’ve brought in, Mike Bodhe, one of our Support Services Engineers Allstars, to answer a few questions around unrolling this new product to our customers.

Read More

Nigerian Prince Alert! CEO Fraud: Phishing Email Scams Targeting CEOs

CEO Fraud Phishing Email ScamPhishing Email Scams Targeting CEOs: You’re Smarter Than A Nigerian Prince, Right?

Before you say you’ll never be one of those people who gets suckered into giving money to a Nigerian prince, just know that, a sophisticated version of this phishing email scam took tech giants, Google and Facebook, for over $100 million.

Yes. Google, a seller of security keys marketed as “the strongest, most phishing-resistant authentication factor for high-value users” and Facebook, a survivor of 600,000 cyber attacks every day, gave money to a Nigerian prince.

In this case, to a 40-something Lithuanian man named Evaldas Rimasauskas, who ran a sophisticated CEO fraud scheme, which involved him impersonating a large computer parts manufacturer using fake email addresses, forged corporates stamps, and phony invoices.

It took two years before anyone even discovered that they were being conned.

Read More

Managed Services For Medical Practices: Why You Desperately Need To Hire An MSP Right Now

managed services for medical practicesIf you’re still on the fence about hiring a managed services provider for your medical practice, just take a moment and imagine this: with managed services for medical practices, your staff would be free liberated in using the latest medical technology, tending to your patients’ needs, all without worrying about if your tools software is up-to-date or if your patients’ medical information are safe from hackers. Managed services for medical practices: here’s why  it’s the best decision you’ll ever make as a healthcare professional and a business owner (and your office administrator will forever be grateful.)

Read More

Ransomware Attacks Are Becoming More Sophisticated

Ransomware

You’ve probably seen articles about a recent cyber attack on LinkedIn or while scrolling through your social media news feed, and think that ransomware is limited to email scams like phishing.

But in this article, we’re going to address different types of ransomware attacks, how they’re growing in complexity and demand, and how you can protect yourself from these increasingly clever and potentially business-ending cyber attacks.

Read More

New Locky Ransomware Attack Affecting Millions

There is a new Locky variant ransomware attack that is hitting at a steady rate of 2 million attacks an hour. Hackers are using 8,000 different versions of a widespread virus script, according to researchers from Barracuda Networks Inc.

There were 20 million of these attacks within the first 24 hours after it was launched Tuesday morning. The magnitude of this attack is significant – growing rapidly and proving to be highly destructive. The target: businesses or institutional groups in the US and Canada.

Read More
Back To Top