Blog

ABA Model Rule Supports Email Encryption

May 09, 2016 / in Blog / by Zafar Khan, RPost CEO

Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption.

Changing Trends in Cyber Security

May 05, 2016 / in Blog / by Zafar Khan, RPost CEO

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.

Retailers are Using Your Online Activity to Make You Pay More

May 04, 2016 / in Blog / by Zafar Khan, RPost CEO

In recent briefings, we have reported on Internet criminals’ behavior with regards to researching their victims’ professional profiles and associations (using LinkedIn recruiter tools, for example) and using these social cues to lure unsuspecting victims into sending money to imposter accounts.

Business Email Compromise (BEC) – Industry Examples

April 14, 2016 / in Blog / by Zafar Khan, RPost CEO

Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization.

Does the New Era of Mega-Leaks Obsolete Attorney-Client Privilege?

April 07, 2016 / in Blog / by Zafar Khan, RPost CEO

On Sunday, more than a hundred media outlets around the world, coordinated by the Washington, DC-based International Consortium of Investigative Journalists (“ICIJ”), released stories on the “Panama Papers”, which is an exposé of private client and internal work product emails and other files.  More than 5 million emails and files were stolen from within the […]