Are you running any antivirus and anti-malware software on your Macs?
What steps have you put into place to secure your firm’s data and protect your clients’ information?
If you’re like most Mac-based law firms, chances are you’re doing very little outside of just ‘using a Mac’ as your security strategy.
Here are eight security strategies you must implement ASAP to protect your firm.
5. The Digital Underground’s
Thriving Black Market
Anyone can easily buy training,
tools and services for committing
fraud, hacking systems, buying
stolen credit cards, setting up
fake web sites, etc.
• Avg estimated price for stolen credit & debit
cards (US): $5 - $30
• Bank login credentials and stealth fun
transfers to US banks: $1,200 for a $20,000
account balance
• Hotel loyalty programs and online auction
accounts: $20 to $1,400
• Online premium content services such as
Netflix: as little as $0.55
• Card cloners: $200-$300
• Fake ATMs: $35,000
6. “But We’re Small...
Nobody Would Bother To Hack Us, Right?”
Wrong!
• Cisco’s 2015 Annual Security Report named law firms as the 7th
highest target for cyber criminals last year, indicating a nearly
50% year-over-year increase.
• Law firms are considered by attackers to be "one stop shops"
for attackers because they have high value information that is
well organized, often with weaker security than clients.
10. 1: Use Full Disk Encryption
Respondents in the 2015
ABA TechSurvey reported
an overall use of full drive
encryption of only 20%
with only 14% for solos.
11. Enable FileVault on all Macs
with ANY firm data.
FileVault encrypts the entire
contents of a device at disk
level, rendering it impossible
for anyone without the login
password to access the data
on the computer.
1: Use Full Disk Encryption
12. Encrypt ALL
external backups:
1. Time Machine
2. Bootable backups
2: Secure Your Backups
13. Encrypt ALL
external backups.
Has a detailed guide.
Does NOT have a detailed guide.
2: Secure Your Backups
15. • Stop using the
same 3 passwords
for everything.
• For password
strength, go for
length
• Use 1Password
3: Use Secure Passwords and a Password Manager
17. 4: Use a Next Generation Firewall
1st layer of security on your network:
create a wall of protection around the
perimeter by implementing a firewall.
18. 5: Use a cloud-delivered
network security service
Umbrella blocks malware, botnets and phishing
over any port, protocol or app. It also detects
and contains advanced attacks before they can
cause damage, by using big data analytics and
machine learning to automate protection
against known and emergent threats.
20. 6: Malware software
Protect yourself.
1. ClamXAV to identify
and quarantine mostly
Windows malware.
2. MalwareBytes for
persistent installed
Adware, Trojans
https://www.malwarebytes.com/antimalware/mac/
https://www.clamxav.com
21. 7: Mobile Device Management
•If anyone other than you
has data on a mobile
device (laptops included)
you need MDM.
•Changing the password is
not enough.
•and you need a MDM
policy in place
22. 8: Proper policies in place
Acceptable Use Policy
Only 19% of solos report having
a computer acceptable use
policy and 32% of firms with 2-9
attorneys.