Excerpt: There are lots of cybersecurity worries to give you the willies in the wee hours of the morning, but we were asked to pick five, so here are some of the most common ones.
Excerpt: We should be grateful for other peoples’ data breaches – they help us to improve our own security. In our breach-a-day world, we seem to have more data breaches than ever. They come fast and furious – rare is the day when we don’t hear of one or more breaches on the evening news or through online media. Attack vectors change constantly – those of us in information security have a deep sense of humility in the face of constant changes in threats as well as technology, policies and training to defend against those threats.
Herewith, a few of the famous data breaches of 2015 (and one from 2014) with lessons to be learned from how they happened.
Excerpt: “Facebook only arrived on the scene in 2004. It seems to many, especially the young, as though it has been here forever, but it has not. Our children simply don’t remember a non-digital life. So much has changed in the last two decades that we find ourselves trekking on unmarked paths in a new frontier. We now – and forevermore – will live in a digital world. Those who are disconnected have become dinosaurs, dying out slowly over time. Change is forced upon us.
Most people have no understanding of the digital property they own, and even less understanding of what may happen to those assets if they die or become incapacitated.”
Excerpt: The most used method of electronically communicating today is via e-mail. Some may argue that text messaging is the number one method and that may be true for the younger generation, but businesses are generally communicating with some sort of e-mail service. The issue that we need to tackle is whether our electronic communications are secure (or need to be) and how to securely communicate when needed.
Excerpt: Lawyers like the idea of connecting with others on a resume driven site and many lawyers who were dismayed by Facebook felt comfortable on LinkedIn. As we write, author Nelson has 2407 connections and author Simek has 562 (slacker).
Like many people, we experimented with belonging to LinkedIn groups. Sadly, we found most of them dominated by marketers. The noise ratio was high, some posts were indistinguishable from spam and we pretty much gave up on those, finding legal listserve discussions to be far more useful.
Excerpt: One night in 2011, a lot of TV viewers (including the authors) were glued to the screen watching Jeopardy. Three episodes made television and science history as IBM’s Watson, a computer with artificial intelligence, took on two of the best players Jeopardy had ever seen.
Ken Jennings had the longest unbeaten run at 74 appearances and Brad Rutter had won the largest prize – $3.25 million.
Excerpt: There are lawyers – mostly family and criminal defense lawyers – who know at least a little about the Deep Web and the Dark Web. But the average lawyer? Not so much. In fact, after the Ashley Madison breach, a lot of family law colleagues began asking us questions about the Deep Web and the Dark Web – where the full steamy contents of the Ashley Madison breach were published in many places. Most had no clue that there was any distinction between the Deep Web and the Dark Web.
Excerpt: Let’s face it – whether you are talking about securing your data or describing the functions of legal IT products, the average lawyer audience may regard your presentation as useful, but hardly as “sexy.” Since we have been successfully lecturing on these topics for 18 years now, we have amassed a number of tips for making our presentations entertaining as well as educational. A friend suggested we share what we have learned.
Excerpt: Note that we did NOT title this article, “What Will You Do If Your Law Firm is Breached?” The reason is simple – experiencing a data breach is not an “if” – it is a “when.” Just ask the IRS and the Office of Personnel Management. Mind you, their approach to information security was sloppy. Lawyers cannot afford, ethically, to have slipshod security when protecting confidential data.
Excerpt: Before you can protect your data, you need to know where it is. That seems pretty obvious, but a lot of lawyers are unaware of all the locations where their data resides. We’re aware that we need to protect the data on the disks that exist in our desktop computers, laptops and servers. We know that there may be confidential data on external media such as USB hard drives and flash drives. However, many attorneys forget about data stored on voicemail systems and their smartphones. Data on backup media needs to be protected too. So let’s dive in and get to the basics of protecting your data securely.