Law Firm Compliance Challenges Underscore Need for Renewed Cyber Security Focus

By |2023-03-07T16:06:13-05:00February 8th, 2023|Cyber-Security, Data Compliance, Information Governance and Management|

Today’s regulatory environment can feel like a minefield. From SOX to HIPAA, GDPR to PCI DSS and new state privacy laws, complex regulations affect nearly every organization. And for attorneys, the landscape proves especially difficult. Each client potentially brings both sensitive data and additional regulations, adding to law firm compliance challenges. Understand How and When Regulations Apply to Law Firms Law firms occupy a unique position that makes them potentially subject to a wide range of regulations. Like any organization, they must comply with the evolving privacy laws of the state(s) in which they do businesses. However, in addition, they

Comments Off on Law Firm Compliance Challenges Underscore Need for Renewed Cyber Security Focus

Cyber Security and Data Governance Best Practices for Today’s Data Environment

By |2022-07-12T14:29:55-04:00June 29th, 2022|Cyber-Security, Information Governance and Management|

A network of hurdles dominates the current data environment. Rapid data growth makes data difficult to manage. Meanwhile, cyber-attacks grow increasingly sophisticated and frequent, while remote work and cloud migration complicate the security landscape. Now, more than ever, cyber security and data governance best practices play a critical role. In 2020, the world generated approximately 2.5 quintillion (that’s 2.5 billion billion) bytes of data. Data analytics hold a world of promise. However, the data comes so quickly and in such volume that organizations struggle to harness its value and keep it safe. Data governance thus becomes a critical priority. Organizations

Comments Off on Cyber Security and Data Governance Best Practices for Today’s Data Environment

Medical Identity Theft – When Your Health Is Their Wealth

By |2020-10-06T05:48:00-04:00August 9th, 2020|Cyber-Security|

Cybercriminals are giving a new meaning to the term ‘Health is Wealth’. Medical identity theft has victimized over 2.2 million people and that number is growing. Although medical identity theft is not something new, the increasing number of data breaches has increased the number of victims. What is Medical Identity Theft? Medical identity theft occurs when someone steals your personal information to get free medical care, medical devices or prescription drugs under your name. This is more dangerous than identity theft because medical identity theft not only ruins your finances, it can have terrible effects on your health. The information

Comments Off on Medical Identity Theft – When Your Health Is Their Wealth

7 Coronavirus related scams targeting your business

By |2020-06-11T13:37:38-04:00May 11th, 2020|Cyber-Security, Safety and Cyber Security|

We’ve warned consumers about Coronavirus related scams, but businesses are at risk, too. Keep your guard up against these seven B2B scams that try to exploit companies’ concerns about COVID-19. In addition to sharing this information with your employees and social networks, read on for how you can report Coronavirus scams to the FTC. Coronavirus related scams: "Public Health" Scams Fraudsters are sending messages that claim to be from the Centers for Disease Control and Prevention (CDC), World Health Organization (WHO), or other public health offices. They may ask for Social Security numbers, tax IDs, etc. Other variations direct you to

Comments Off on 7 Coronavirus related scams targeting your business

COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

By |2020-06-11T13:49:00-04:00April 23rd, 2020|Cyber-Security, Safety and Cyber Security|

Since the COVID-19 pandemic began, cybercrime has increased by up to 300%. According to cyber security experts, a big part of that increase has come in the form of COVID-19 phishing scams. Now more than ever, organizations must remain hyper-vigilant to protect assets and employees from attack. With many employees working from home (WFH), everyone appears to be a target. With expanded security perimeters, reports of phishing attacks are way up, even within our own organization. Current COVID-19 Phishing Scams The most common COVID-19 phishing scams involve the sinister but effective method of spoofing authoritative sources. Often-spoofed organizations include the

Comments Off on COVID-19 Phishing SCAMS: 5 ways to Protect Your Business

Coronavirus Phishing Attacks Target Remote Workers

By |2020-06-12T10:32:00-04:00March 24th, 2020|Cyber-Security, Safety and Cyber Security|

Spurred by social distancing orders, the American workforce is returning home. In fact, Netskope Threat Labs reports that 58 percent of users worked remotely last week. This compares with an average of 27 percent prior to the pandemic. Unfortunately, researchers have also recorded a corresponding spike in coronavirus phishing attacks. Cyber criminals love a crisis, from terror attacks to natural disasters. Using emotional appeals and a sense of urgency, they trick users into surrendering sensitive information or unknowingly downloading malware. And most of the time, they use email to launch the attack. Remote Work Raises the Risk While advances in

Comments Off on Coronavirus Phishing Attacks Target Remote Workers

Advancements in Data Encryption Up the Data Defense Game

By |2020-06-12T10:44:38-04:00March 5th, 2020|Cyber-Security, Data Compliance, Technology|

From credit card transactions to online loan applications and sensitive emails, billions of pieces of valuable information cross the internet every hour. Keeping that data safe from unauthorized access requires increasingly sophisticated tools. As the challenges to data security grow more intense, advancements in data encryption rise to meet them. In the movies, messengers transmitted important documents in a briefcase, handcuffed to the messenger’s wrist and accessible only via a key. The messenger made certain that no one tampered with the document during transit and that only the intended recipient opened the briefcase to retrieve and read its contents. Encryption

Comments Off on Advancements in Data Encryption Up the Data Defense Game

Cloud Security Tips to Ease the Transition from GroupWise to Office 365

By |2020-06-01T09:41:08-04:00November 13th, 2019|Office 365 and Migration, Safety and Cyber Security|

Reports of the state of business cloud security in 2019 show a good news/bad news scenario. The good news for GroupWise users contemplating a move to the cloud and possibly Office 365? Specifically, security offerings have improved. In addition, most cloud service providers stay on top of infrastructure security. In fact, none of the high-profile breaches of 2018 resulted from cloud service provider negligence. The bad news? Organizations have largely failed to keep pace with emerging security technologies. For example, misconfiguration ranks a close second to credential hijacking as the most common cause of security breaches. Less than half of

Comments Off on Cloud Security Tips to Ease the Transition from GroupWise to Office 365

Minimize Risk with Effective Cyber-Security Training

By |2020-06-01T10:13:03-04:00September 3rd, 2019|Safety and Cyber Security|

Effective cyber-security training tips from Dena Kamel You can (and should) install firewalls and antivirus, define email filters and policies and even deploy advanced threat detection. But if you fail to fully address human error, you have missed the most vulnerable aspect of information security. The solution lies in delivering effective cyber-security training, a goal that can prove difficult to achieve. Employees inadvertently create security problems by using weak passwords, clicking malicious links, failing to properly delete data and ignoring other basic rules of data protection. Providing ongoing, engaging and pertinent training can potentially save your organization millions of dollars

Comments Off on Minimize Risk with Effective Cyber-Security Training

Microsoft Active Directory Management to Control Access and Boost Security

By |2020-05-22T05:00:05-04:00July 23rd, 2019|Safety and Cyber Security|

Active Directory management tips from Ross Phillips A small to medium-sized business may include hundreds of employees and thousands of devices. Microsoft Active Directory (AD) provides an indispensable method for identifying those resources and managing access within the system. In organizations with data in the cloud, Azure AD provides a similar service for cloud-based servers and applications such as Office 365 for business. Active Directory and Azure AD form the core of an organization’s information technology (IT) environment. Tapping into the full capabilities of these tools requires Windows PowerShell, a command-line shell and scripting environment. While PowerShell is essential to

Comments Off on Microsoft Active Directory Management to Control Access and Boost Security
Go to Top