Tackling the Human Aspect of Cyber Security: THE PSYCHOLOGY OF A LAW FIRM

| December 28, 2017

article image
The threat to the legal sector In the aftermath of headline-grabbing cyber attacks, managing partners in law firms around the world have been posing the same question to their firm’s IT leaders: “Could this happen to us?” “Yes” is likely the honest answer. As the legal industry has become increasingly digitised, it becomes even more susceptible to the threat of a debilitating data breach. Law practices are a potential goldmine for cyber criminals, with confidential client records offering rich pickings. The kind of information that circulates daily in firms – banking records, company accounting reports, address details, and insurance records – can be extremely valuable to cyber criminals. Identity theft, IP theft and bank fraud, just some of the hacker’s potential gains.

Spotlight

Myriad Supply

A 2017 Crain's Best Places to Work and ninth consecutive honoree on the Inc. 5000 list, Myriad is a provider of best-in-practice Security, Mobility, SDN, and Cloud solutions. With over 10,000 global clients and nationwide distribution facilities, Myriad serves Fortune 500, Service Providers, Hosting and Big Data, Web 2.0, Retail, FinTech, Financial Services, and Manufacturing clients as a full-service, one-stop resource.

OTHER ARTICLES

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | February 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

What You Need to Know About the Cybersecurity Solarium Commission Report

Article | March 20, 2020

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response before a major cyber incident occurs, not after. Unlike the original Solarium Commission, which operated in a classified environment, the Cybersecurity Solarium Commission chose to release its report publicly out of recognition that cybersecurity involves everyone. “In studying this issue,” begins the letter from Sen. Angus King and Rep. Mike Gallagher, the chairmen of the commission, “it is easy to descend into a morass of classification, acronyms, jargon, and obscure government organization charts. To avoid that, we tried something different: an unclassified report that we hope will be found readable by the very people who are affected by the very people who are affected by cyber insecurity – everyone. This report is also aimed squarely at action; it has numerous recommendations addressing organizational, policy, and technical issues, and we included an appendix with draft bills that Congress can rapidly act upon to put these ideas into practice and make America more secure.”

Read More

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | February 17, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

Spotlight

Myriad Supply

A 2017 Crain's Best Places to Work and ninth consecutive honoree on the Inc. 5000 list, Myriad is a provider of best-in-practice Security, Mobility, SDN, and Cloud solutions. With over 10,000 global clients and nationwide distribution facilities, Myriad serves Fortune 500, Service Providers, Hosting and Big Data, Web 2.0, Retail, FinTech, Financial Services, and Manufacturing clients as a full-service, one-stop resource.

Events