Is your law firm as secure as it could be?

  • 75% of firms are using some anti-virus software.
  • 58% of responding firms are using a firewall or anti-phishing software.
  • 33% of firms are using email encryption software.
  • 25% are using device encryption software.
  • 17% of law firms have some directory security in place.
  • 25% of firms train their staff on cybersecurity best practices.
  • A firewall is a particular type of solution that maintains the security of your network. It blocks unauthorized users from gaining access to your data. Firewalls are deployed via hardware, software, or a combination of the two.
  • Intrusion Detection. One of the only surefire ways to protect your network and data is to actively watch over it. A Security Operations Center (SOC) can monitor your network traffic around the clock and respond to any intrusion attempts in real time.
  • Length and Complexity. The easier it is for you to remember a password, the easier it’ll be for a hacker to crack.
  • Personal Information. Password recovery systems use personal details to verify a user’s identity — unfortunately, with widespread use of social media, it’s not difficult for hackers to research a target through Facebook to determine when they were born, information about their family, personal interests, etc.
  • Numbers, Case, and Symbols. While it may be easier to remember a password that’s all lower-case letters, it’s important to mix in numbers, capitals, and symbols in order to increase the complexity.
  • Avoid Patterns and Sequences. “abc123”, or the first row of letters on the keyboard, “qwerty”, etc., are extremely easy for hackers to guess.
  • Be wary of links and attachments in email messages. They may contain malware that can infect your computer.
  • Confirm the real sender of the message. The company name in the “From” field should match the address. Also, watch for addresses that contain typographical errors or lookalike domains like “janedoe@microsofthelp.com”.
  • Hover over the URL in the email to view the full address. If you don’t recognize it, or if all the URLs in the email are the same, phishing is likely.

--

--

--

Comprehensive IT Service & Support for Businesses and Medical Practices.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Tank Melee Hack Free Resources Generator

Hakluke’s Guide to Nmap — Port Scanning is Just The Beginning

Which are the best cybersecurity certifications for the IT world

Ahold-Delhaize and how bug bounty reports should be handled

The WFH Series: Addressing the Tech and Security Concerns of Remote Work

Tinlake v3: Growing DeFi Usability to the Real World

How can boards oversee cyber security effectively?

Safety and security risks mount

AMG Logistics

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
mPowered IT

mPowered IT

Comprehensive IT Service & Support for Businesses and Medical Practices.

More from Medium

Charging Toward Sustainability: Solutions to Reduce IoT Device Battery Waste | Soracom

Bill Belichick & Stoicism

For Biology to eat the world, software will have to eat Biology

Rethinking Cemeteries as We Rush to Restore Our Habitat