Cyber resilience – the six biggest threats right now for legal

Jess Carey Posted By Jess Carey
from Burlington Media

Cyber resilience – the ability to withstand both attacks on your computer network and attempts to steal valuable client data – is a business priority which an increasing number of legal firms in London and UK depend on us for year after year.

The threat constantly evolves and grows – and legal firms are at particular peril. In this article, we look at the 6 biggest current threats as we perceive them.

1.   Bring your own device policies

A sensitive area for many legal firms is their “bring your own device” policy. Whereas in previous years colleagues would take a work laptop home with them or out on the road, most of the functions they used to carry out on these devices can now be performed just as successfully on a smartphone or a tablet via a web browser.

From an access point of view, there’s now just no real need to invest in out-of-office portable IT for firms nor the software that’s loaded onto it.

However, sensitive company information, particularly emails, can be intercepted on insecure WiFi connections and your firm’s executives may find themselves and the technology they use targeted for special attention by cybercriminals.

More so than ever before, investment in encryption and a strong firewall is essential.

2.   The threat from within

Graham Cluley, independent security researcher, told Computer Weekly that while most company focus is on external cyber threats, "a significant threat is also posed by employees who can have authorised access to the company network from behind the firewall".

That threat still exists. It’s rare that bad actors internally will try to steal money from your company – it’s more likely your data that’s got the greater commercial value to them.

Because your staff are behind your firewall, there’s always going to be a degree of vulnerability your firm will be exposed to. However, much of that can be offset by banning removable media from your firm and installing software which monitors access to and transfer of data files that are most sensitive.

3.   Crypto-jacking

Bitcoin may have fallen in value by two-thirds since its peak in December 2017 but its value is still tens of thousands of times greater than it was even five years ago. The crypto-currency sector is still enormous and, because of the computing power needed to “mine” currency, the barriers to entry are high.

There has, in the last year or two, been a growing threat to computer users through the surreptitious installation of crypto-jacking software – software which uses your terminals’ and network’s computing power to mine for Bitcoin.

Crypto-jacking software puts a very heavy workload on the computers and systems onto which it has been installed often leading to hugely impaired performance and sometimes even the failure of a system and the computers attached to it. In addition, crypto-jacking software authors may intentionally leave holes in their software to allow them to download other types of malware later in the future.

Read the full article on Sprout IT’s legal IT and technology blog:

Post a Comment

Add your comment