Peer to Peer Magazine

Winter 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/624538

Contents of this Issue

Navigation

Page 48 of 71

PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA 50 of malware and attack vectors — virus, ransomware, malware, directed attacks — and you must protect your firm from all these threats. Directed attacks include spear-phishing, which is on the rise and comprises targeted email messages and/ or phone calls that intend to elicit a social response by appearing to come from someone the user knows. Recent examples include: • Finance directors received email messages from their managing directors requesting that they share information with a third party • A CFO received a request from the president of the firm to wire money to a specific account These spear-phishing requests often include the name, phone number and email address of the person with whom the user is to communicate, and sometimes the email is followed up by a phone call. The attacks are targeted and rely upon the users' instincts to react to their superiors' directives. Only a critical eye will keep your users and firm from falling prey to these attacks. Firewalls have also evolved to become more aware. They are capable of extensive scanning, detection and classification of traffic to better determine what should be exiting and entering your network. These next-generation firewalls allow for rapid protection of your network from new and emerging threats. Instead of simply allowing or not allowing traffic, newer firewall technology allows for real-time inspection of traffic and identifies malicious traffic that previously would have passed through. PHYSICAL SYSTEMS Security is necessary not just for your online activity and data but also for your physical systems. Can someone walk up to your server and pull out the hard drive? You might want to implement biometric locks on your server room. These locks have reduced significantly in price and enable access logging and quick access changes. Another option to consider is adding locks to server rooms and changing them regularly. One alternative would be to move the firm's servers and storage outside the office into a co-location facility that has: • Fully managed security and access control • Redundant heating and cooling • Protected electrical systems that include backups and generators with extended runtimes EDUCATION AND WORKING TOGETHER There are tools to minimize risk, but firms must educate users on proper browsing FEATURES And it's all powered by our SQL Contact BEC Legal for a demonstration. Look for upcoming ILTA Product Briefing webinars at Legal Calendaring and Docketing— could it be that easy? BEC Schedule Express provides client/matter scheduling directly from the MS Outlook calendar. BEC Docket Enterprise backs it up with centralized controls for distribution, reminders, reports and rules-based docketing.

Articles in this issue

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2015