In light of the news that cyber thieves stole £11m of client money in a year, please find a comment from Adam Maskatiya, General Manager, UK & Ireland at Kasperksy Lab.
Adam Maskatiya, General Manager, UK & Ireland at Kasperksy Lab:
“Lawyers’ and solicitors’ firms hold high volumes of sensitive information, so it is clear to see why they are tempting targets for cyber-criminals. Protecting against cyber-attack attempts from these threat actors comes down to having a security strategy that covers every angle. This is especially vital in the light of new data laws: for any business holding EU citizen data, the GDPR’s requirement for a ‘secure by design’ approach to systems and processes is making cybersecurity a strategic necessity; something that must be built in to all business operations that touch or deal with personal data. Law firms must apply cybersecurity solutions to minimise unauthorised access to information. To do this, they should put themselves in the place of the attacker, determine the points of potential vulnerability and then apply a multi-layered defence strategy.
Employee education is also key to defending against cyber-attacks: further than just telling workers what they should and should not do when it comes to using technology, law firms must help their staff identify vulnerabilities that could occur during everyday scenarios – such as opening suspicious-looking emails that could put the company at risk, and fostering a security mindset that staff should apply to every situation and daily activity.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.