Peer to Peer Magazine

March 2013

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/116777

Contents of this Issue

Navigation

Page 18 of 111

best practices excellent target for hackers. Hackers and criminal syndicates are not letting this opportunity go by. • Phishing Attacks That Slip Past Network Defenses: Employees are using mobile devices increasingly to read email and surf the Web at remote locations, such as home offices and cafés. Accessing public resources outside the secured network perimeter of the law firm makes it easier for viruses and other malware to slip onto the device. When employees return to the office, so does their malware. • Lost Devices: On average, every mobile worker in the United States loses a cellphone each year. When law firm employees 20 Peer to Peer lose devices with case matter, client-attorney confidentiality is put in jeopardy. Even if a lost smartphone or tablet doesn't contain confidential data, it still might include apps or cached credentials that make it easier for criminals to hack into a law firm's network or bank account. • Risky File-Sharing: According to a recent survey by iPass, the average mobile worker is now carrying 3.5 devices. It's not unusual for an office worker to have a smartphone and a laptop, and then to purchase an iPad or some other tablet for the convenience of reading long documents on a highly portable crisp display. The worker might be carrying all three devices at any time. Of course, devices are only useful if they

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - March 2013