Closing The Loop

Articles on law firm security

How to Use Two-Factor Authentication to Protect Data in Litigation & Discovery

You’ve been hacked. Whether you’re aware of it or not, it’s almost certain that hackers somewhere have your private, personal information: your name, email addresses, passwords, birth dates, etc. Hackers may ha... Casey C. Sullivan   |     01 Dec 2017

5 Email Security Tips Lawyers Can Use to Encrypt Their Attorney-Client Communications

In today’s cybercrime-ridden business environment, hackers are increasingly targeting law firms to mine sensitive client data. As the ABA has noted, cybercriminals love to pick on law firms because they often s... Eric Pesale   |     08 Nov 2017

Law Firm Data Breach Could Be Panama Papers 2.0

In April, 2016, over 11 million confidential files, taken during a data breach at the Panamanian law firm Mossack Fonseca, were leaked to the press. These “Panama Papers” revealed the Byzantine complex of shell... Casey C. Sullivan   |     27 Oct 2017

Equifax Breach Raises New Data Security Considerations for Law Firms & Companies

Thanks to a recent string of high-profile cyberattacks, data breaches have never been as hot a topic as they are now. Few of the more recent ones, however, have been more egregious or controversial as the recen... Eric Pesale   |     23 Oct 2017

When Phishers Steal From a Deal, Who’s Left on the Hook?

When phishers jump into a deal, running off with hundreds of thousands of dollars in intercepted funds, which party is left on the hook? One recent case out of Ohio provides some insight. The case, Beau Townsen... Casey C. Sullivan   |     10 Oct 2017

Faulty Spam Filter Costs Firm $394,000

“I didn’t get the email,” is never an acceptable excuse. It’s doubly unacceptable when it’s in response to a judge’s order assessing attorneys’ fees. But that’s exactly what a Florida law firm was left arguing ... Casey C. Sullivan   |     27 Sep 2017

Are Sloppy Metadata Practices Putting You at Risk?

If you’re not paying attention to the metadata in your public files, you may be giving cybercriminals an open invitation to hack into your law firm’s servers. While cybercriminals use a number of methods to byp... Eric Pesale   |     21 Sep 2017

Updated Criminal Procedure Rule Allows Government to Remote-Hack Computers

Whether they’re threatening to spill the deets on the Game of Thrones finale or pilfering confidential BigLaw client data for insider trading, cybercriminals are using increasingly sophisticated methods to wrea... Eric Pesale   |     06 Sep 2017
Watch an on-demand webinar on eDiscovery dirty tricks (and how to defeat them)

Subscribe To Our Blog

Download your free guide to Slack Discovery

Let us know what you thought about this post.

Put your comment below.