3 min read
Ethics: Protect Your Electronic Contact List from Prying Eyes
Introduction to an Ethical Problem Most Attorneys Don’t Know About In April of 2022, a headline caught our attention. It referenced a new legal...
We've crafted solutions tailored to your firm
The world of insurance for law firms can be confusing, and difficult to navigate. We've created this glossary because these common insurance terms should be easy to understand.
3 min read
Sharon D. Nelson Esq., Sensei Enterprises : Dec 20, 2022 9:49:29 AM
Did Your Law Firm Survive Thanksgiving?
We’re happy to say that our company survived – but we were attacked over 400 times between shutting the office down on Wednesday evening and Thursday morning. All of the attacks originated from Microsoft IP addresses (are you addressing this Microsoft?).
Did we get a good night’s sleep that Wednesday? Sure. Good preparation for attacks means that, if the attack is unsuccessful, you don’t get alerts. We learned of all the attacks first thing Thanksgiving morning, with a full report to review over our morning coffee.
Don’t think we’re cocky about “winning” the battle. No one is immune from cyberattacks, no matter how good their defenses are. We regard it as being both well-prepared — and lucky.
But it did occur to us, with Christmas and New Year’s on the way, that it was time to underscore to law firms something that should be obvious: Cybercriminals don’t go on holiday!
Shore Up Your Law Firm Defenses: Scary Stats
The week before Thanksgiving, cybersecurity firm Cybereason published the results of its recent survey. Understandably, more than a third of respondents reported that it took longer for their organization to assess, stop and recover from a cyberattack on a holiday or weekend attack as opposed to a weekday. The larger the organization, the longer the delay.
They also lose more money because of those attacks, which are primarily ransomware attacks. The root of the problem is that so many victims are understaffed on weekends and holidays. Half of the respondents reported being staffed at levels below 33%. 20% of companies cut security staffing by 90% from normal weekday levels.
This gives attacks more time to avoid detection, do more damage, and exfiltrate more data as these understaffed security teams scramble to respond.
Cyber Pros Buckle Up, Worried About a Visit from The Grinch
It has now been a lot of years that cyber pros have been battling holiday-related attacks, so most of them are on edge – and lacking the power to demand that staffing be maintained at normal or close to normal levels.
When Santa comes this year, all these experts know that hackers will not be far behind. History is our guide: From the Aurora attacks on Google in 2009 to the more recent Log4J and SolarWinds attacks, the notable fact is that these attacks took place mostly between Thanksgiving and New Year’s Day.
No cyber pro worth their salt assumes they will be home for the holidays.
A Gift of Ransomware for the Holidays?
Yeah, not much of a gift, but once that seems to be ever-increasing. In 2021 there was a 70% increase in ransomware attacks in November and December compared to January and February.
So, what is a law firm to do? The best advice these days comes from the Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security. Its advice, well worth taking, has been updated for 2022.
Here are, verbatim, some of the tips that are integral to preventing and fighting weekend and holiday attacks. Law firm management should make sure all of these steps are in place.
“Understand the IT environment’s routine activity and architecture by establishing a baseline. By implementing a behavior-based analytics approach, an organization can better assess user, endpoint, and network activity patterns. This approach can help an organization remain alert on deviations from normal activity and detect anomalies. Understanding when users log in to the network—and from what location—can assist in identifying anomalies. Understanding the baseline environment—including the normal internal and external traffic—can also help in detecting anomalies. Suspicious traffic patterns are usually the first indicators of a network incident but cannot be detected without establishing a baseline for the corporate network.
Indicators of suspicious activity that threat hunters should look for include:
Final (Altered) Words from The Grinch Whole Stole Christmas
I must stop Christmas from coming... but how? He puzzled and puzzled 'till his puzzler was sore. Ransomware, that’s how!
Sharon D. Nelson, Esq., is the President of Sensei Enterprises, Inc., a digital forensics, cybersecurity and information technology firm in Fairfax, Virginia. Ms. Nelson is the author of the noted electronic evidence blog, Ride the Lightning and is a co-host of the Legal Talk Network podcast series called “The Digital Edge: Lawyers and Technology” as well as “Digital Detectives.” She is a frequent author (eighteen books published by the ABA and hundreds of articles) and speaker on legal technology, cybersecurity and electronic evidence topics. She was the President of the Virginia State Bar June 2013 – June 2014 and a past President of the Fairfax Law Foundation and the Fairfax Bar Association. She may be reached at snelson@senseient.com
3 min read
Introduction to an Ethical Problem Most Attorneys Don’t Know About In April of 2022, a headline caught our attention. It referenced a new legal...
Zero Trust Architecture simplified Lawyers have a “deer in the headlights” look whenever we talk about Zero Trust Architecture (ZTA) - and we do...
4 min read
Why We Wrote This Article The President of Sensei Enterprises, co-author Sharon Nelson, is a woman. She is involved with multiple groups and...