Happy Cybersecurity Awareness Month – A Hacker-Proof Office System to Prevent Attacks
October is Cybersecurity Awareness Month. At Integrated Technology Services, LLC and the Law Offices of Daniel J. Siegel, LLC, we regularly work with law firms and small businesses to help them protect against cyberattacks. We assist with all facets of preparedness, from assessing their infrastructure to creating cybersecurity plans to training to techno-ethics counseling.… Read the rest
In the Sony Playstation litigation, a document was disclosed that was intended to be redacted, but it wasn’t, and lo and behold, everyone can see the numbers, which are presumably confidential.
When Pamela Myers (my co-author of The Ultimate Guide to Adobe Acrobat DC) and I reviewed the image, we immediately recognized how it happened.… Read the rest
Attorney Daniel J. Siegel, principal of the Law Offices of Daniel J. Siegel, LLC and founder of technology/workflow consulting firm Integrated Technology Services, LLC, has been appointed Co-Chair of the Pennsylvania Bar Association Technology Committee, a newly-created committee of Pennsylvania’s largest association of attorneys. PBA President Michael McDonald created the Committee to help make good lawyers better. Attorney Jennifer Ellis serves as Co-Chair.… Read the rest
Although only one in seven businesses typically reports a cybersecurity hack to the federal government that should change now that the recent budget/government funding law requires 16 types of businesses to report hacks to the Department of Homeland Security within 72 hours. The types of hacks that must be reported include data breaches and ransomware attacks/payments. Lawyers and law firms already have an ethical obligation under the Rules of Professional Conduct to report breaches, attacks and other cybersecurity incidents to clients whose data may have been impacted.… Read the rest
The Federal Bureau of Investigation (FBI) has released a Private Industry Notification (PIN) to warn U.S. governments, elected officials and candidates about cybersecurity threats, particularly invoice-themed phishing emails that could be used to harvest these officials’ login credentials. This threat applies to all governments, local to national, all government employees, all elected officials, and all candidates for elected office. In short, this threat applies to a wide range of people, and it is one to take very seriously.… Read the rest
No matter your politics, most of us aren’t thinking of President Biden when it comes to technology advice. Yet it was the Biden White House offering excellent advice on protecting yourself online. This isn’t fancy geek language, it is the same cybersecurity advice I have given in dozens of programs not only to lawyers and law firms but also to community groups and others.… Read the rest
The FCC has added Kaspersky products to the list of cybersecurity risks. Law firms should alert staff not to use the products on any devices that access their firms’ networks to safeguard client information.
Of course, the last thing you need from your Internet security product is for it to be a threat to your security. Let alone national security. But on Friday, the Federal Communications Commission (FCC) called Kaspersky a national cybersecurity threat by adding Kaspersky, China Mobile, and China Telecom to the list of companies affected by the Secure and Trusted Communications Networks Act of 2019.… Read the rest
In the new COVID world in which the traditional office has been replaced in full or in part by a work from home existence, many of us never think about the issues that arise when we are doing our jobs at the kitchen table.
… Read the rest
The NSA has released a cybersecurity report on how to better secure Voice and Video Over Internet Protocol (VOIP) systems. These systems allows you to make calls using an Internet connection rather than a regular phone line and combine voice, video, and instant messaging.
The report is helpful and provides easy-to-understand guidance on how to protect these communications from vulnerabilities and hackers and limit the risk to data confidentiality.… Read the rest