NIST has identified five steps to online safety: IDENTIFY what needs to be protected against cyber attack. PROTECT Limit or contain the impact of a cyber event through protective measures. DETECT precursors to the incident as well as attacks in progress. RESPOND to issues an incident creates. RECOVER from an incident.
What if – despite your best efforts – you experience a cyber attack? That’s where your OBLIC policy Data Breach Endorsement comes in. If you experience a cyber attack, immediately report it to OBLIC and contact your IT professional. OBLIC cyber coverage has addressed claims involving: Ransomware Security Breach Cyber Extortion Spam Email Wire Transfer […]
The ABA Standing Committee on Ethics and Professional Responsibility has issued two recent opinions addressing security of client protected information. ABA Formal Opinion 477R Securing Communication of Protected Client Information. The Opinion states: A lawyer generally may transmit information relating to the representation of a client over the internet without violating the Model Rules of […]
If you haven’t used the tools in OBLIC’s Cyber Toolbox you’re really missing out! An online resource for OBLIC policyholders, the Cyber Toolbox has a plethora of information! Cyber Training materials including: Training Courses to help you train employees on data security best practices with interactive online courses on key privacy and data security in […]
The Ohio Data Protection Act, Sec. 1354.01-1354.05 Ohio Revised Code, became effective November 2, 2018. It institutes a safe harbor for a business that is proactive in establishing a written cybersecurity program that conforms to the NIST Cybersecurity Framework. The Act provides an affirmative defense to a tort action brought under state law or in state courts for […]
As noted in the Ransomware Training Guide in the OBLIC Cyber “Toolbox”, ransomware attacks are now one of the most popular cyber attacks. Ransomware uses encryption to lock the victim’s files and hold them hostage until the attackers’ demands are paid. The best defense to ransomware is your backup. For computer systems that have adequate back up, […]
With IoT (Internet of Things) connecting us to devices to do everything from adjusting the thermostat to giving travel directions, it can seem like an impossible task to manage all the passwords we use on a daily basis. It is vitally important that every device networked to our law office are protected by strong passwords. […]
Sending documents without proper redaction to remove metadata can result in inadvertent cyber disclosure of client confidential data. A PDF, or Portable Document Format, is designed to allow users of any operating system to open and view files. There are many free applications that allow for the viewing of these documents. Because of its wide […]
As we move toward tax filing deadlines, there is usually an increase in scams involving the IRS. While these scams often involve individuals, they also target tax professionals – including attorneys. Tax Scams/Consumer Alerts is a helpful publication by the IRS. How to know it’s really the IRS calling or knocking on your door gives […]
The 2018 Cost of a Data Breach Study by the Ponemon Institute reports that the global average cost of a data breach is $3.9 million. The average cost for each lost or stolen record containing sensitive and confidential information increased to $148 per record. Looking at it from another angle, a study presented at RSA, […]