Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybersecurity

Report – 66% of US law firms reported a breach in 2016

NetSecurity – “The majority of US-based law firms are not only exposed in a wide variety of areas, but in many cases, unaware of intrusion attempts. These findings were based on Logicforce survey data from over 200 law firms, anonymous system monitoring data and results from their on-site assessments. The degree of preparation and vigilance within the industry at large will continue to place many law firms at unnecessary risk of losing valuable client data such as trade secrets and intellectual property. Such breakdowns in security could result in financial losses for the targeted firms and their clients. Approximately 40% of law firms in the study underwent at least one client data security audit, and Logicforce predicts this will rise to 60% by the end of 2018…”

  • Jordan McQuown: “CIO Law firms today face more cyber security threats than ever before and the threat landscape is evolving rapidly.  If you don’t understand where you are at risk and what to do about it, it’s nearly impossible to defend your clients’ data and your firm’s reputation.  I want to help you understand where you are at risk right now by sharing my list of top 10 cyber security threats. As the CIO of LOGICFORCE, I see law firms being subjected to a wide variety of cyber threats.  Any one of these threats might cause irreparable damage to your law firm.  Yet each one of these can also be addressed effectively with the right technologies and right approach.  Here are my top 10 cyber security threats for law firms and what you can do about them.
    1. Lack of Pervasive Security Mindset
    2. Security Issues With Third Party Providers And Cloud Systems
    3. Ransomware
    4. Rogue Employees
    5. Hactivists
    6. Nation-State Espionage
    7. Accidental Exposure By Well-Intentioned Employees
    8. Technology Obsolescence
    9. Password Management Being Weak Or Non-Existent
    10. Reduced Security Standards For Remote Workers…”

Personal data of millions of Verizon customers exposed in cyber breach

Public Knowledge Urges FCC to Investigate Verizon Customer Data Breach – “Today, reports indicate that one of Verizon’s business partners, Nice Systems, exposed millions of Verizon customer records. According to ZDNet, “as many as 14 million records of subscribers who called [Verizon’s] customer services in the past six months were found on an unprotected Amazon S3… Continue Reading

Global Study – The need for a new IT security architecture

“Cyber-attacks happen by the minute—and in our industry on the whole, they’re not being handled adequately. To get a better view of why that is, Citrix teamed up with the Ponemon Institute to find out what’s holding up businesses from appropriately addressing security issues. Here’s what we found and how businesses can take smarter steps… Continue Reading

IG Audit of OPM IT Systems – Follow on to massive breach of employee data

Follow up to previous posting of November 2016 – Audit of OPM Security Systems Shows Continued Material Weakness – an update via NextGov: “More than two years after suffering a massive data beach [of over 20 million current and past federal employee personal data], the Office of Personnel Management still isn’t sufficiently vetting many of… Continue Reading

Cybersecurity: The cold war online

Cybersecurity: The cold war online, Steven Aftergood. Nature 547, 30–31 (06 July 2017) doi:10.1038/547030a. Published online 05 July 2017. “The Internet is under attack, and not just by hackers, thieves and spies. As Alexander Klimburg reports in The Darkening Web, governments that insist on their own primacy are increasingly assaulting the idea of this digitized… Continue Reading

Black Hat USA Report – Portrait of an Imminent Cyberthreat

July 2017 Portrait of an Imminent Cyberthreat – Cyber attacks on US enterprises and critical infrastructure are coming soon, according to some of the industry’s most experienced and highly informed security professionals. And in most cases, defenders are not prepared. “Most information security professionals believe that the US critical infrastructure will be breached by a… Continue Reading

ABA – Cloud Ethics Opinions Around the U.S.

ABA Law Practice Division – “Cloud Ethics Opinions – There’s a compelling business case for cloud computing, but can lawyers use it ethically? We’ve compiled these comparison charts to help you make the right decision for your practice. What is Cloud Computing? About This Map Broadly defined, cloud computing (or “Software as a Service”) refers to… Continue Reading

Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified

Treasury Inspector General for Tax Administration – The Number of Employment-Related Identity Theft Victims Is Significantly Greater Than Identified, June 20, 2017, Reference Number: 2017-40-031.”Employment-related identity theft (hereafter referred to as employment identity theft) occurs when an identity thief uses another person’s identity to gain employment. Taxpayers may first realize they are a victim when… Continue Reading

IC3 Issues Internet Crime Report for 2016

“The Internet Crime Complaint Center (IC3) has released its 2016 Internet Crime Report, describing the numbers and types of cyber crimes reported to IC3. Business Email Compromise (BEC), ransomware attacks, tech support fraud, and extortion are all common schemes affecting people in the U.S. and around the world. US-CERT encourages users to review the 2016… Continue Reading

Unisys Security Index™ U.S.

“The Unisys Security Index measures concerns of consumers on issues related to national, personal, financial and internet security around the world. In the U.S., the greatest increase in concern since 2014 was in the area of internet security: 51%. Learn more about concerns in the other areas.” Continue Reading

2017 Online Trust Audit Released

2017 Online Trust Audit Released – What Did We Learn? Jeff Wilbur, June 20, 2017  – “Today we released the 9th annual Online Trust Audit and Honor Roll. This year’s Audit is our most comprehensive ever, assessing more than 1000 consumer-facing sites for their adoption of best practices in consumer/brand protection, site security and responsible… Continue Reading

Apple employs former intel agents to squelch product and tech leaks

William Turton, The Outline – Leaked recording: Inside Apple’s global war on leakers – Former NSA agents, secrecy members on product teams, and a screening apparatus bigger than the TSA. “A recording of an internal briefing at Apple earlier this month obtained by The Outline sheds new light on how far the most valuable company… Continue Reading