Skip to Content

Cyber dangers

Phishing scams: Be the one that got away

Phishing involves the use of an email, text message or phone call that appears to come from a trusted source or institution, vendor or company, but is actually from a third-party impostor. Phishing messages are intended to trick you into giving fraudsters your information by asking you to update or confirm personal or online account… Read More »

Categories: Articles, Cyber dangers, New Lawyer Issue, Tech Tips

Paying attention to the fraud behind the curtain

mystery person at laptop

We have previously written about the dangers associated with email spoofing and phishing schemes, where fraudsters will send fabricated emails purporting to be from a trusted colleague or third party in an effort to trick a lawyer or staff member into clicking on a dangerous link or downloading a dangerous attachment. These fraudulent schemes continue… Read More »

Categories: 2020 January - Finding Your Way, Articles, Cyber dangers, Tech Tips

Paying attention to the fraud behind the curtain: Don’t get fooled by spoofed email addresses

fishing hook on mouse

We have written previously about the dangers associated with email spoofing and phishing schemes, where fraudsters will send fabricated emails purporting to be from a trusted colleague or third party in an effort to trick a lawyer or staff member into clicking on a dangerous link or downloading a dangerous attachment. These fraudulent schemes continue… Read More »

Categories: Cyber dangers, Fraud, Webzine

New lawyer cyber dangers and how to avoid them

sinister man stealing laptop

Like the local bank, your practice holds valuable information and money. Your computer systems may contain client information, trade secrets, and intellectual property. Your trust accounts have large sums of money. A cyber breach or trust account theft will harm your clients and potentially cripple your practice. Security guards, specialized safes, and sophisticated procedures protect… Read More »

Categories: 2018 Student Issue 6, Articles, Content Type, Cyber dangers, LAWPRO Magazine, New Lawyer Issue, Student, Topics

Does your firm need cybercrime insurance?

In a study titled The Cost of Cybercrime, Accenture surveyed 254 companies in seven countries. Over the course of five years, the study revealed a 62 per cent increase in cybercrime attacks. Data breaches during the same period doubled to 130 per year. Accenture noted that while not every security breach results in a loss,… Read More »

Categories: 2018 February Top Legal Disruptions, Articles, Content Type, Cyber dangers, Disaster Planning, Firm Management, Insurance Business, LAWPRO Magazine, LAWPRO Magazine Article Type, LAWPRO policy, Legal Technology, Topics

How to safely put your data in the cloud

cloud over desk

Cloud services help you access and store data on someone else’s server. You may not realize it, but Dropbox, Gmail, Facebook, and legal specific applications like Clio are all examples of cloud services. Putting data on the cloud raises issues like maintaining confidentiality, usability, cost, portability and applicability to your area of practice. Keeping in… Read More »

Categories: 2018 February Top Legal Disruptions, Articles, Content Type, Cyber dangers, LAWPRO Magazine, LAWPRO Magazine Article Type, Legal Technology, Tech Tips, Topics

Cybersecurity for the home and office

For many lawyers, the divide between “home” and “office” isn’t clear-cut. Work is often done in both places and during the trips back and forth. As a result, sensitive client information may not always be protected under the umbrella of a firm cybersecurity system. Cybersecurity for the Home and Home Office can help lawyers understand… Read More »

Categories: 2018 February Top Legal Disruptions, Articles, Book Review, Content Type, Cyber dangers, LAWPRO Magazine, LAWPRO Magazine Article Type, Legal Technology, Topics

Encryption Made Simple for Lawyers

Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client’s information as well. Fortunately, easy-to-use options are available today for encryption. It has now… Read More »

Categories: Book, Content Type, Cyber dangers, Legal Technology

Land Acknowledgement

The offices of LAWPRO are located on the traditional territory of many nations including the Mississaugas of the Credit, Anishnabeg, Chippewa, Haudenosaunee and Wendat peoples. Toronto is covered by Treaty 13 with the Mississaugas of the Credit. LAWPRO respects and acknowledges the histories, languages, knowledge systems, and cultures of First Nations, Metis, and Inuit nations.

Back to top