Legal Loudspeaker Blog

Latest from Legal Loudspeaker Blog - Page 2

Five Office 365 Apps You Should Be Using If you are a daily user of Microsoft Office 365, you probably know your way around Word, Excel, & PowerPoint. Here are five other apps Office 365 offers that are very beneficial, but not as well known. Flow Microsoft Flow allows users to create automated workflows between your favorite apps and services to get notifications, syncronize files, collect data and more. Flow has dozens of premade templates
Sophisticated Phishing Impersonation Techniques on the Rise According to a recent report from helpnetsecurity.com, three main areas of cyberattacks are on the rise in 2019. HTTPS encryption in URL-based attacks, spoofed (Spear) phishing attempts, and cloud-based attacks focused on publicly hosted trusted file-sharing services. This data was compiled after 1.3 billion emails were analyzed. 1. HTTPS in URL based attacks climbed 26% In Q1 2019 a 26% quarter-over-quarter increase in malicious URLs using HTTPS and…
To address these new threats and the gaps in security for our clients, our Cybersecurity team has developed the CORE Security Program (Cyber Operation Response & Engineering). CORE was developed to bring our clients up to an acceptable level of defense using defense in depth and by leveraging people, processes and technology. It is designed to provide the visibility we need to create an audit trail in the event of an attack. As part of this…
As part of the MITS (Managed IT Services), we provide our clients with a basic level of incident response and recovery for cybersecurity issues. Many of our clients are asking “what happened” after an incident but, in most cases, we cannot answer that question because we simply do not have a proper cybersecurity program in place to audit the threat. Many firms are unaware that their network has been breached or infiltrated until they notice…
In order to talk about how cybersecurity is evolving, we need to talk about how cyber attacks and hacking have evolved. Having just a perimeter firewall, antispam, and an antivirus program just isn’t enough now.  As time goes on, the degree of complexity of attacks and the needed expertise and time to remediate them is growing.  Nearly 70% of small businesses have experienced some form of cyber attack  In 2015 43% of cyber attacks targeted small business, in 2019 that…
In order to talk about how cybersecurity is evolving, we need to talk about how cyber attacks and hacking have evolved. Having just a perimeter firewall, antispam, and an antivirus program just isn’t enough now.  As time goes on, the degree of complexity of attacks and the needed expertise and time to remediate them is growing.  Nearly 70% of small businesses have experienced some form of cyber attack  In 2015 43% of cyber attacks targeted small business, in 2019 that…
Think about the first time you opened Word after a version upgrade. You probably didn’t like the default font or the spacing, but you just changed it and got on with the business of work. Then you opened it up again, and made the same changes again — and again, and again, and again.  This can get rather annoying and cumbersome. You can save time and frustration by modifying the Normal.dotx template, which is what…
The CORE Security program affirms your network security is continually strengthened to help keep up with the ever-evolving risk of cyberattacks. Our Cybersecurity Engineers and vCISO (Virtual Chief Information Security Officer) will work with your firm to provide a holistic approach to cybersecurity using people, processes and technology. This comprehensive approach will allow us to successfully prevent, mitigate, and remediate more cyberattacks successfully. Traditional security measures for a network consisted of applying patching and installing…