#SenseiSherlock was delighted to be reunited in Chicago with D.C. Superior Court Judge Herbert Dixon, who serves on the ABA TECHSHOW Planning Board with Sensei’s John Simek.
The likelihood that a lawyer would fall for these primitive versions of ransomware was small. Fast forward to the days of Cryptolocker which began in 2013. This ransomware Trojan attacked computers running Microsoft Windows, propagating itself by getting a user to click on an attachment or a link contained in an e-mail. Click on the link or attachment and “Winner, Winner, Chicken Dinner” the malware invisibly downloaded and began to encrypt your files. The malware encrypted files stored locally on the computer system as well as on any mapped network drives, such as those files on your server, connected flash drives and other external USB drives.
If you look at the “Hot Buttons” column in the July/August 2017 issue of the ABA’s Law Practice Magazine, you will find the article “Running with the Machines: AI in the Practice of Law” written by Sensei’s Sharon Nelson and John Simek. The Law Practice Magazine is a bi-monthly publication of the American Bar Association’s Law Practice Division.
Excerpt: Back in 2015, in this column, we wrote a piece titled “How Will Watson’s Children Impact the Future of Law Practice?” What a lot has happened in two years! The children of Watson and other artificial intelligence (AI) technologies continue to spawn at an ever-accelerating rate.
In this episode of Digital Detectives, hosts Sharon Nelson and John Simek speak with Denver Edwards about cybersecurity. In their discussion, they address the National Institute of Standards and Technology’s (NIST) cybersecurity framework and how it relates to the FTC’s work. They also talk about how a company can use the NIST framework along with FTC guidance in order to minimize security risks. They conclude the episode with predictions regarding how the Trump Administration will handle cybersecurity.
Excerpt: Not always. There was a recent case in which confidential data was not, to put it mildly, well handled. The corporate defendant, a mortgage servicer, was accused of violating a consumer’s privacy rights based on the manner in which it handled collection calls. The defendant protected its customer data with layers of network security consistent with best practices and ISO guidelines. During discovery, the plaintiff’s experts received the calling data and copies of the customer service call recordings.
Both experts had unrelated full-time day jobs. Their expert witness work was a side business run out of their homes. Neither expert had a technical degree, and neither had taken a course in data security for over a decade. Both experts stored the sensitive case data in their homes. There were no locks on the doors to their home offices, so anyone in the houses had access to the drives. Neither expert was familiar with the basic ISO standards relating to data security. Neither had a written data security plan for their home network, and no outside company had ever performed vulnerability or penetration testing on their networks. One expert had no automatic intrusion detection software on his network. Both routinely produced data with sensitive PII (personally identifiable information) in unencrypted form.
Sensei’s Sharon Nelson and John Simek were recently featured in “Legal Technology Spending: Biggest Money-Wasters” by Joan Feldman with Attorney at Work.
Excerpt: The internet is really helpful at listing common ways people waste their money. But legal technology spending is a bit trickier to control than your gym fees or cable bill. Even when it’s just you and your laptop. So, where are law firms losing money? Today, legal technology experts Heidi Alexander, Sharon Nelson and John Simek, Catherine Reach, Nora Regis, Deborah Savadra and Courtney Troutman point to the biggest money-wasters in law offices — and share their tips for spending wisely.