Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the […]
Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption.
In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues.
In recent briefings, we have reported on Internet criminals’ behavior with regards to researching their victims’ professional profiles and associations (using LinkedIn recruiter tools, for example) and using these social cues to lure unsuspecting victims into sending money to imposter accounts.
Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization.
December 13, 2024
December 09, 2024
December 03, 2024
November 29, 2024
November 20, 2024