Search

39 results found for “cyber ”

  • Cyber Insurance: I don’t know what it is, but am pretty sure I need it!

    …Here is a test to see if you need cyber insurance: Does your business have client data and utilize the internet?  If you answered yes, then you absolutely need cyber insurance.  If you answe…

  • How Much Risk in Cyber Liability?

    … continues to look into the possibility of adding cyber coverage to your professional policy.  However, we’ve found that this type of coverage (those “endorsed onto” a policy) is…

  • Keep Your Data Safe This Summer

    …;     Tightening Up your Cyber Security 2)      7 Tips for Protecting Your Online Reputation 3)      Four Gambling…

  • Solo and Small Firm Legal Technology Guide

    … disaster Tomorrow in legal tech, from trends in cyber risks to cloud computing and relevant new ethics opinions Legal Technology Guide: Author Q and A Following is from the Legal Technology Today…

  • Does Your Spam Filter Have Fatal Holes?

    …ial agency of the NC Bar Association, can provide cyber liability coverage to suit your needs. Contact Lawyers Insurance online or at 1-800-662-8843.

  • 10 Tips for Cybersecurity Month

    …ntractor, internet service provider, vendors, and cyber insurance contact are all good numbers to have handy. Check for breached credentials at Have I Been Pwned? While you are there, take a look…

  • Legal Profession is Going Strong, Says ABA

    …nment jobs, and one percent opened solo offices. Cyber Security. Twenty-three percent of law firms reported a security or data breach in 2018, up from 22 percent in 2017 and 14 percent in 2016. Thirty…

  • 3 Step Plan for Your Cyber Response Team

    …Is your cyber response team trained, fully staffed and ready to swing into action if needed? If your answer to that question was – “Cyber response team? What cyber response team?” &n…

  • 10 E-Alternatives to the Mighty Post-It Note

    …suming scrap of paper – survive in a sleek, cyber world? Because it works. And because no software program, app or messaging platform comes close to matching its ease of use, versatility or conv…

  • This Cyber Checklist Can Protect Your Firm Against Hacks

    …g. “Attorneys are increasingly targeted by cyber attackers,” writes Sherri Davidoff of LMG Security. “Breaches occur because an employee clicked on a link in a phishing email, downlo…

  • Small Devices Pose Huge Cyber Risks

    You might not think your copy machine poses a potentially disastrous cybersecurity risk. But just ask New York health care provider Affinity Health Plan, which sustained financial losses of more than a million dollars fol…

  • 90 Percent of Cyber Attacks Come Via Email

    …know that phishing emails account for 9 out of 10 cyber attacks? And that although most people – 78 percent, in fact – know better than to click on a suspicious email, four percent will cl…

  • Capital One Breach Shows Value of Cyber Insurance

    … – is a stark reminder of the importance of cyber insurance coverage. The breach affected approximately 106 million Capital One customers in the US and Canada. In its wake, the bank took the unu…

  • NIST Cyber Corner Offers 24/7 Help

    Looking for training and guidance on cybersecurity that’s free and available 24/7? Check out the Small Business Cybersecurity Corner, a new website from the National Institute of Standards and Technology. “Th…

  • Does Your Firm Need an Ambassador of Buzz?

    …eting – Method) Director, Ethical Hacking (cyber penetration expert – Predictive Systems, Inc.) Master of Disaster (safeguards access to information after a calamity – MapInfo) Pro…

  • 10 Steps for Solo and Small Firm Cyber-Safety

    …attack, smaller shops might not. A study from the Cyber Security Alliance found that 60 percent of small businesses (not just law firms) are forced to close their doors within six months of a…

  • Practice Cyber Safety or Lose Clients

    …You might not think cyber security is such a big deal. Your clients might disagree. And some aren’t just sitting back and hoping their attorneys are being cyber-savvy. They’re demanding p…

  • Wait, I hired a hacker?!

    … we talk about internal threats when dealing with cyber security?  Research shows that about 28% of all data breaches are the result of internal actors.  (Verizon 2018 Data Breach Investigati…

  • FREAKing Out about the Latest Cyber Security Issue

    Did you hear about the FREAK security flaw? Be honest, you just googled it. Last week, a security flaw – referred to as FREAK – quietly hit tech news sites as affecting Apple and Google devices. Later, Micros…

  • Hackers Use MS Office Files to Deliver Malware

    …g malware via email, accounting for 38 percent of cyber attacks. The next most popular delivery method: archived files such as .zip and .jar, which account for about 37 percent of malicious transmissio…

  • Quote and Issue a Cyber Liability Policy in minutes!

    … done the work for you. We have reviewed multiple Cyber Liability programs in order to find the best protection available – so you don’t have to.  We are excited to announce that we h…

  • Microsoft Says Phishing Scams are Rising

    …” One way to protect your practice against cyber events is by being insured with Lawyers Mutual. When we learn about new scams and emerging threats, we send out alerts to our insureds. It’…

  • Tightening Up your Cyber Security

    …ght—now they have to add fraud to the list. Cyber security is high on the priority list of businesses worldwide. As an attorney it’s important to be proactive in protecting valuable client …

  • Google Calendar is Phishing Minefield

    …ial agency of the NC Bar Association, can provide cyber liability coverage to suit your needs. Contact Lawyers Insurance online or at 1-800-662-8843.  

  • Trust Funds and Cyber Law on Lawyers Mutual 2016 Seminar Agenda

    …ust requirements Trust reconciliations   Cyber Safeguards and Procedures In another portion, the focus shifts to managing cyber risks. As the recent massive Panama Papers law firm data breach…

  • Can You Tell a Worm from a Bot?

    …i-virus programs are up to the task. Five Common Cyber Threats Following are excerpts from a “malware bestiary” compiled by Grimes: “Most malware programs aren’t viruses. A…

  • Trust Funds and Cyber Law on Lawyers Mutual 2016 Seminar Agenda

    …ust requirements Trust reconciliations   Cyber Safeguards and Procedures In another portion, the focus shifts to managing cyber risks. As the recent massive Panama Papers law firm data breach…

  • 6 Ways to Defend Against Email Impersonation Attacks

    …ail Security Report here. Email is Front Line of Cyber Wars Email is the largest single attack vector on the planet, according to Mimecast. The war is being waged on multiple fronts. All types of ema…

  • Tightening Up your Cyber Security

    … October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches…

  • “We hacked your website and we’ve got data on you and your clients.”

    …g. “Attorneys are increasingly targeted by cyber attackers,” writes Sherri Davidoff of LMG Security. “Breaches occur because an employee clicked on a link in a phishing email, d…

  • Let's Talk Trust Funds and Cyber Law

    …ust requirements Trust reconciliations   Cyber Safeguards and Procedures In another portion, the focus shifts to managing cyber risks. As the recent massive Panama Papers law firm data breach…

  • 8 Tips From NC’s Cutting-Edge Law Firms

    …ar headquarters in Raleigh. Register here. From Cyber Safety to Succession Planning Among the topics for the Second Annual NC Managing Partner Summit: New blueprints for growth Innovations for b…

  • Cyber Protection Now Available For NC Solos and Small Firms

    …ltant to assist law firms. We’ve been doing cyber insurance four to five years. At first, law firms weren’t ready for it. Now I get excited about being able to provide a real solution for a…

  • Defending Your Data from Within

    …ut in place the requisite tools to prevent common cyber attacks, and is reasonably well-defended against external intrusions, hackers, viruses, malware, worms, ransomware, and other common scourges of …

  • Cyber Protection For NC Solos and Small Firms

    … to assist law firms. We’ve been doing cyber insurance four to five years. At first, law firms weren’t ready for it. Now I get excited about being able to provide a real solution …

  • There’s a razor blade in my candy bar!

    …nd a relaxing vacation! Did you miss any of our "Cyber Monday" blog series? Check them out here: Everything I need to know about encryption I learned from Cracker Jacks The Myth of Security by Anon…

  • 10 Key Questions About Cyber Insurance Coverage

    …Do I need cyber insurance, and if so where can I get it? Is it expensive? And how exactly will it protect me and my clients? These were some of the questions raised at an ABA Techshow forum titled …

  • The Myth of Security by Anonymity

    …It is comforting to think of cyber threats as always targeting specific people or companies.  That allows us to believe that if we are small enough, are not involved in high-profile matters, or ar…

  • Survey: People Fear Cyber Crime More Than Violent Crime

    …As cyber threats continue to rise, Americans say they’re more worried about cybercrime than any other type of crime. People are twice as afraid of having their computer hacked than they are abou…