The increasing popularity of cryptocurrency is creating an enticing opportunity for people to hide money and assets offshore, before the calculation of the equitable distribution of assets in a divorce, when a bankruptcy trustee is looking for hidden assets and
Attorney at Law Magazine
Blog Authors
Latest from Attorney at Law Magazine
Expert Witness Forensic Evaluations After Cybercrimes
After a person or a business has been the victim of a cyberattack or cybercrime, it’s unlikely that the cybercriminal will be caught. But in some cases, the victim may have a legal course of action that will require a…
FIDO Stops Cybercrooks From Fetching Your Data
Passwords are the root cause of over 95% of data breaches. Just addressing password problems will go a long way toward providing your firm with a level of cybersecurity.
One of the newer security protocols to alleviate the need for…
Overcoming Fear of New Technology
Unless you are an IT or cybersecurity techie like me, you may be afraid of new technology. I recently spoke with Catherine Sanders Reach, director for the Center for Practice Management at the North Carolina Bar Association, about the pain points…
Cybersecurity Ethics Requirements
“Are you encrypting your hard drives, are you encrypting your servers, are you encrypting your data in transit and in storage? the answer should be yes,” Catherine Sanders Reach, Director of the NCBA Center for Practice Management told me recently.…
Cybersecurity for Law School Grads and New Firms
I speak to students at NCCU School of Law every semester about cybersecurity for their practices. I start with the supposition that they will be starting a solo practice. They will be using a new or relatively new computer and…
Breaking News: Blockchain Security Trademarked
As the digital age has transformed the way we access goods, services, and information, the ease that comes with doing nearly everything online comes with a significant cost—a lack of privacy.
Just think of all the data on the web,…
Cryptocurrency Security
Cryptocurrency’s growth in popularity is now (finally!) being matched by its growth in accessibility and with that growth has come increased issues of cybersecurity.
Until recently, those looking to buy, sell or trade cryptocurrency would have to go through the…
CMMC 2.0: What You Need to Know If You do Business with Uncle Sam
The Department of Defense’s (DoD) Office of the Under Secretary of Defense for Acquisition and Sustainment recently issued a long-awaited overhaul to its Cybersecurity Maturity Model Certification (CMMC) program by introducing CMMC 2.0, which:
- Lowers the number of CMMC levels
…
Law Firms at Risk: Ransomware Attacks on the Rise
This year has seen an escalating series of high-profile ransom-ware attacks impacting businesses in a variety of sectors. After this most recent revelation, however, it would behoove law firms, specifically, to be on high alert for emerging cyber threats.
In…