Skip to Content

« Return to LAWPRO Magazine

LAWPRO Magazine: 2013 December Cybercrime

Top Stories

Download Full Issue PDF


More from the 2013 December Cybercrime Issue

Cyber risk insurance options: Do you have the coverage you need? 1

The prevalence of cyber-related crime has been steadily increasing for a number of years. Many businesses invest heavily in the necessary IT infrastructure to protect their data, but despite best efforts and intentions, the frequent news stories in the press should serve as confirmation that breaches do occur. The cost implications of having personal or… Read More »

Download PDF


Be ready with an incident response plan 2

Because a cybercrime attack can cause irreparable harm, law firms should be prepared to take action immediately. Being able to do this requires an Incident Response Plan (IRP). An effective IRP can put a firm in a position to effectively and efficiently manage a breach by protecting sensitive data, systems, and networks, and to quickly… Read More »

Download PDF



LAWPRO has a corporate LinkedIn page. Does your firm? 4

LAWPRO has had a corporate LinkedIn page for almost two years now. We find it a useful tool to connect with lawyers and other legal profession stakeholders. It allows us to easily share LAWPRO-related information with LinkedIn users. As well as giving us a corporate presence and the ability to post updates, we have customized… Read More »

Download PDF


Keeping your passwords strong and secure 5

Computer passwords are the keys that “unlock” our computer and network systems. We all have more passwords than we can remember. This tends to make us a bit lazy. We use obvious and easy-to-remember passwords – even the word “password” itself. Or worse: we don’t use them at all. Bad password habits are often one… Read More »

Download PDF


Would you take the bait in a phishing scam? 6

“Phishing” is one of the most common scams that cyber criminals use because it can produce spectacular results with very little effort or expense on the part of the hacker. Phishing involves the use of an email, text message or phone call that appears to come from a trusted source or institution, vendor or company,… Read More »

Download PDF


Draw clients a roadmap to avoid communication claims 7

Our readers should now be well aware that problems with lawyer-client communication are the number one cause of malpractice claims. Managing communication takes patience and effort: at one extreme of the spectrum, responding to calls and messages from clients who want constant contact can be frustrating; while at the other end, trying to get absentee… Read More »

Download PDF


Book review: The ABA Cybersecurity Handbook 8

“There are two types of firms: those that know they’ve been (cyber) attacked and those that don’t,” says Jill Rhodes, co-author along with Vincent Polley of the The ABA Cybersecurity Handbook. The book is an initiative of the ABA Cybersecurity Legal Task Force that was created in 2012 to bring together the legal community and… Read More »

Download PDF


Back to top