-
The Security Services That Will Protect Your Law Firm
Law firms remain a vulnerable target of cyberattacks because of their vast amount of confidential information, a statistically lower adoptability rate of security tools, and a high-volume of file sharing…
-
Make Sure Your Firm’s Cybersecurity Insurance Policy Stays Active—and Enforceable
Cybersecurity breaches have become an all-too-common occurrence at all types of businesses, including law firms. Many firms have cybersecurity insurance, but they don’t realize they can lose their policy if…
-
Dark Web Monitoring – Revealing Exposure and Safeguarding Law Firms
The “dark web” refers to a small subset of the Internet that is intentionally hidden, built to keep the activity of its users anonymous and private. You cannot access dark web…
-
Cybersecurity Concerns Should Scare You Into Action
October is Cybersecurity Awareness Month and it’s no coincidence that Halloween shares the same month because both can be pretty scary. However, just like with Halloween’s haunted houses and dark…
-
A Day at MSSP Alert Live
Late last week, while working with my team on our continued search for a Next Gen Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and User…
-
What is a SOC 2 Report and Why it is Necessary to your Firm
The Service Organization Control (SOC) 2 report demonstrates that an independent accounting and auditing firm has reviewed and examined an organization’s non-financial control objectives and activities and has rigorously tested…
-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
Endpoint Security: What is it and why is it important?
Your firm has dozens, if not hundreds, of endpoints. These are your remote computing devices that communicate with a network – servers, virtual environments, desktops, laptops, workstations, tablets, smartphones, and…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry since 2020.”…
-
Security Awareness Training: How To Build a United Cybersecurity Front
A security awareness training program helps protect your firm and its members by helping them avoid falling victim to current phishing campaigns, social engineering techniques and tactics, and other threats.
-
Top 5 Cybersecurity Trends in 2022
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than ever…
-
Advisory: Apache Log4j Vulnerability Log4j Zero-day Vulnerability AKA Log4Shell (CVE-2021-44228)
What is the Log4j Vulnerability? On December 9, a severe remote code vulnerability was revealed in Apache’s Log4j, a prevalent logging system used by developers of web and server applications…