Trusted law firms have trusted communication. Email that is the real thing.
Cybercriminals are using trust to commit financial fraud.
Law firms are a prime target for cybercriminals.
Law firms have uniquely personal relationships with clients, making them highly...
Cyber Attacks! – It’s not a question of if. But when…
Before we get into the crux of the article, some stats -
Ø According to the University of Maryland, more than 2,200 cyber-attacks occur each day....
Enhancing Legal Practice Security with BullWall: A Comprehensive Cybersecurity Solution
As the legal fraternity increasingly transitions to digital operations, safeguarding sensitive client information and maintaining confidentiality have become critical priorities. With the rise of...
Check your law firm email for impersonation
Want to know how safe your domain is from impersonation? Check your score https://sendmarc.com/know-your-score/.
The email problem:
96% of phishing attacks arrive via email, highlighting that...
AI, NFTs and the Modern Contract – Who Holds Responsibility?
As far back as 2018, Harvard Business Review raised the question: how is artificial intelligence (AI) changing contracts? Five years may not fit the...
DNSSense: “Cybersecurity leaders must focus on DNS security”
The absence of cybersecurity measures is hindering the digital vertical growth of the South African economy. A recent report revealed that nearly 90% of...
Payment fraud: Steps to take if your business gets scammed
Payment fraud is a nightmare scenario for any business. Irrespective of size, companies face substantial financial and reputational harm resulting from fraudulent activity. Depending...
Digital Transformation’s growing attack surface
Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage...
Why the office of the future will demand stronger security measures
In today's age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few...
What to Know Before Giving Into Ransom Demands
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced...
Advanced Electronic Signatures – A Technology whose time has come
Part 2 - In my previous article on the subject (available here), I dealt with the arguments against using Advanced Electronic Signatures (Aes), and the...
Advanced Electronic Signatures – A Technology whose time has come
Since its inclusion in the Electronic Communications and Transactions Act (ECT Act), some 16 years ago, the Advanced Electronic Signature has been treated a...