SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
8 Security Strategies Your
Mac-Based Practice Must
Implement Today
Tom	Lambotte

CEO,	GlobalMac	IT	
www.GlobalMacIT.com
How	To	Avoid	Being	A	Sitting	Duck		
To	Cybercriminals	And	Protect	Everything		
You’ve	Worked	So	Hard	To	Achieve
Ultimately We’re Going To Cover…
A Quick Overview Of The Sophistication
And Proliferation Of The
Cybercrime Business
The Evolution of Crime
The Digital Underground’s
Thriving Black Market
Anyone	can	easily	buy	training,	
tools	and	services	for	committing	
fraud,	hacking	systems,	buying	
stolen	credit	cards,	setting	up	
fake	web	sites,	etc.
• Avg	estimated	price	for	stolen	credit	&	debit	
cards	(US):	$5	-	$30	
• Bank	login	credentials	and	stealth	fun	
transfers	to	US	banks:	$1,200	for	a	$20,000	
account	balance	
• Hotel	loyalty	programs	and	online	auction	
accounts:	$20	to	$1,400	
• Online	premium	content	services	such	as	
Netflix:	as	little	as	$0.55	
• Card	cloners:	$200-$300	
• Fake	ATMs:	$35,000
“But We’re Small...

Nobody Would Bother To Hack Us, Right?”
Wrong!
• Cisco’s	2015	Annual	Security	Report	named	law	firms	as	the	7th	
highest	target	for	cyber	criminals	last	year,	indicating	a	nearly	
50%	year-over-year	increase.	
• Law	firms	are	considered	by	attackers	to	be	"one	stop	shops"	
for	attackers	because	they	have	high	value	information	that	is	
well	organized,	often	with	weaker	security	than	clients.
Email!
So How DOYou
Protect Yourself?
8 things you
MUST do
to minimize
the risk to your law practice
1: Use Full Disk Encryption
Respondents in the 2015
ABA TechSurvey reported
an overall use of full drive
encryption of only 20%
with only 14% for solos.
Enable FileVault on all Macs
with ANY firm data.

FileVault encrypts the entire
contents of a device at disk
level, rendering it impossible
for anyone without the login
password to access the data
on the computer.
1: Use Full Disk Encryption
Encrypt ALL 

external backups:

1. Time Machine

2. Bootable backups
2: Secure Your Backups
Encrypt ALL 

external backups.

Has a detailed guide.
Does NOT have a detailed guide.
2: Secure Your Backups
3: Use Secure Passwords and a Password Manager
• Stop using the
same 3 passwords
for everything.

• For password
strength, go for
length

• Use 1Password
3: Use Secure Passwords and a Password Manager
3: Passwords
•Use multi-factor
authentication aka
two-factor
authentication or 2FA
4: Use a Next Generation Firewall
1st layer of security on your network:

create a wall of protection around the
perimeter by implementing a firewall.
5: Use a cloud-delivered
network security service
Umbrella blocks malware, botnets and phishing
over any port, protocol or app. It also detects
and contains advanced attacks before they can
cause damage, by using big data analytics and
machine learning to automate protection
against known and emergent threats.
6: Malware software
Protect yo’self.
6: Malware software
Protect yourself.

1. ClamXAV to identify
and quarantine mostly
Windows malware.

2. MalwareBytes for
persistent installed
Adware, Trojans

https://www.malwarebytes.com/antimalware/mac/
https://www.clamxav.com
7: Mobile Device Management
•If anyone other than you
has data on a mobile
device (laptops included)
you need MDM.

•Changing the password is
not enough.

•and you need a MDM
policy in place
8: Proper policies in place
Acceptable Use Policy
Only 19% of solos report having
a computer acceptable use
policy and 32% of firms with 2-9
attorneys.
Bottom Line:	
You	Need	To	Get	Serious	

About	Protecting	Your	Law	
Practice	Against	Cybercrime!	
(sorry	for	yelling)
Q & A:
tom@globalmacit.com
facebook.com/globalmac
linkedin.com/in/tomlambotte
@LegalMacIT

Weitere ähnliche Inhalte

Was ist angesagt?

Internet security
Internet securityInternet security
Internet security
at1211
 

Was ist angesagt? (19)

How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Spyware
SpywareSpyware
Spyware
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
How does Ransomware Works?
How does Ransomware Works? How does Ransomware Works?
How does Ransomware Works?
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?
 
Internet security
Internet securityInternet security
Internet security
 
Malware
MalwareMalware
Malware
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
CYBER SECURITY THREATS - Polytechnic Ungku Omar
CYBER SECURITY THREATS - Polytechnic Ungku OmarCYBER SECURITY THREATS - Polytechnic Ungku Omar
CYBER SECURITY THREATS - Polytechnic Ungku Omar
 

Ähnlich wie How to Secure Your Mac Based Law Practice

First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 

Ähnlich wie How to Secure Your Mac Based Law Practice (20)

Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Hamza
HamzaHamza
Hamza
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Web Security
Web SecurityWeb Security
Web Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Mehr von Rocket Matter, LLC

Mehr von Rocket Matter, LLC (20)

Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019
 
Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide
 
How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019
 
Legal Project Management Demystified
Legal Project Management Demystified Legal Project Management Demystified
Legal Project Management Demystified
 
Hurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law FirmsHurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law Firms
 
Make it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting PaidMake it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting Paid
 
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost ReducitonIncrease Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
 
Productivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for LawyersProductivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for Lawyers
 
Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter
 
The Lean Law Firm
The Lean Law Firm The Lean Law Firm
The Lean Law Firm
 
The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2
 
How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018
 
Delivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service ExperienceDelivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service Experience
 
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible FirmHow Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
 
How Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee ArrangementsHow Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee Arrangements
 
Capturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and RubyCapturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and Ruby
 
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better PracticeBeyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
 
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and WorkflowsBoost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
 
Paperless law office primer 2017 edition
Paperless law office primer 2017 editionPaperless law office primer 2017 edition
Paperless law office primer 2017 edition
 
How small firms use legal practice management software
How small firms use legal practice management softwareHow small firms use legal practice management software
How small firms use legal practice management software
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

How to Secure Your Mac Based Law Practice