cybercriminals using trust to commit fraud

Trusted law firms have trusted communication. Email that is the real thing.

0
Cybercriminals are using trust to commit financial fraud. Law firms are a prime target for cybercriminals. Law firms have uniquely personal relationships with clients, making them highly...
Cyber attacks

Cyber Attacks! – It’s not a question of if. But when…

0
Before we get into the crux of the article, some stats -  Ø  According to the University of Maryland, more than 2,200 cyber-attacks occur each day....
Bullwall

Enhancing Legal Practice Security with BullWall: A Comprehensive Cybersecurity Solution

0
As the legal fraternity increasingly transitions to digital operations, safeguarding sensitive client information and maintaining confidentiality have become critical priorities. With the rise of...
Check domain with SendMArc

Check your law firm email for impersonation

0
Want to know how safe your domain is from impersonation? Check your score https://sendmarc.com/know-your-score/. The email problem: 96% of phishing attacks arrive via email, highlighting that...
Carrie Peter

AI, NFTs and the Modern Contract – Who Holds Responsibility? 

0
As far back as 2018, Harvard Business Review raised the question: how is artificial intelligence (AI) changing contracts? Five years may not fit the...
DNSSense_Things of the internet

DNSSense: “Cybersecurity leaders must focus on DNS security” 

0
The absence of cybersecurity measures is hindering the digital vertical growth of the South African economy. A recent report revealed that nearly 90% of...
Ryan Mer of EFTsure

Payment fraud: Steps to take if your business gets scammed

0
Payment fraud is a nightmare scenario for any business. Irrespective of size, companies face substantial financial and reputational harm resulting from fraudulent activity. Depending...
Kevin Halkerd

Digital Transformation’s growing attack surface

0
Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage...
Dana Eitzen from Canon

Why the office of the future will demand stronger security measures

0
In today's age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few...
Simon Colman from Digital Distribution at SHA

What to Know Before Giving Into Ransom Demands

0
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced...
AES by LAWTrust

Advanced Electronic Signatures – A Technology whose time has come

0
Part 2 - In my previous article on the subject (available here), I dealt with the arguments against using Advanced Electronic Signatures (Aes), and the...
AES by LAWTrust

Advanced Electronic Signatures – A Technology whose time has come

0
Since its inclusion in the Electronic Communications and Transactions Act (ECT Act), some 16 years ago, the Advanced Electronic Signature has been treated a...