Easy to remember passwords like the name of a family member, a pet, or your favorite team should be a thing of the past at your firm. If you are relying on remembering passwords by writing them in a book
Attorney at Law Magazine
Latest from Attorney at Law Magazine - Page 2
Elon Musk Wants You to Buy a Tesla with Bitcoin. Will Legal Services Be Next?
On February 16, Elon Musk announced that his electric car company, Tesla, would soon be allowing customers to buy their cars with Bitcoin. Up until now, the world’s most popular cryptocurrency has been mostly used as an investment product rather than…
Russian Hackers: They Came in Through the Bathroom Window
We all asked the same question. How could Russian hackers have breached U.S. government agencies’ information systems? The answer is, they simply jiggled the door handles and checked for open windows, the way a burglar might do to get into…
Doing Business With the DOD Requires New Cybersecurity Levels
dodIf your law firm or your client’s company wish to capture some of the US Department of Defense’s (DOD) $600 billion annual budget, the Cybersecurity Maturity Model Certification (CMMC) will be a requirement for contract awards and will be rolled…
What You, Elon Musk & Bill Gates Have in Common as COVID-19 Hacks Surge
You would think that people like Elon Musk and Bill Gates would have bulletproof cybersecurity. But in July, their Twitter accounts were hacked along with the accounts of Warren Buffett, Joe Biden, and Jeff Bezos. It was the kind of…
Making Your Video Conferences and Webinars Cybersafe
With meetings, conferences, and conventions being canceled by COVID-19, law firms are looking at new ways to communicate using video conferencing and webinars now and in the future. The bulk of CLEs will be online.
Firms forced to switch from…
Cybersecurity for Practicing at Home
Sheltering in place requires cybersecurity for your phone, laptop, tablet, WiFi and all other Internet connected devices (IoT devices). Gaps in your home information set-up can expose you to a cyberattack and infect all your devices.
Your system contains client…
CSI Cybersecurity: Your Client Was Hacked, Now What?
A business client contacts your law firm and says their information system was hacked or breached, and they need to pursue legal action. The first step is proving that a crime occurred and how it occurred. Think CSI: Cybersecurity.
CRIME…
Law Firm Records Held Hostage in Case Management Software Hack
Some law firms in the Triangle were among the 2,500 firms nationwide that use TrialWorks Case Management Software and received the below message by email Oct. 13 alerting them to the case management software hack.
[FinalTilesGallery id=’62’]
TrialWorks is a…
Does the Other Side of Your Wire Transfer Have Cybersecurity?
Wiring funds or sensitive, valuable information demands cybersecurity at both ends of the wire transfer. Cyber criminals have gotten very astute at intercepting wire transfers of data and money.
But no matter how cybersecure your law firm is, if the…