ARTICLE
16 October 2019

Lawyers: Beware Of Phishing Emails

AG
Archer & Greiner P.C.
Contributor
Archer & Greiner is now Archer. But what matters most is what remains the same. Our new name still represents an unwavering commitment to delivering large-firm expertise with small-firm attention—no matter the size of the client. It’s a philosophy that’s helped us grow into one of the largest and most trusted law firms in the Mid-Atlantic region, serving businesses and individuals throughout the region and in a growing number of other states and jurisdictions. With a network of regional offices from Delaware to New York, Archer has more than 175 lawyers practicing in all major legal disciplines including corporate, labor, commercial litigation, family, real estate and many more.
You, or someone you know, have invariably received a phishing email message. A phishing email can be a simple request for assistance by someone purporting to be your colleague
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.
Read the full article in The Barrister, here.

You, or someone you know, have invariably received a phishing email message. A phishing email can be a simple request for assistance by someone purporting to be your colleague or employee or another person or entity you trust. It is often sent on a summer Friday afternoon when the leadership who made the request is no longer available or at an odd hour (think 5:30 A.M. or 8:30 P.M.). The email commonly uses the style and/or logo of your firm's standard emails, and begins a vague request for assistance, such as:

"Hey, I am stuck in a meeting but I need your assistance. Are you in the office right now and able to assist."

For others, phishing emails come from a person pretending to be Dropbox or another recognized service and requesting that you download a resource or document. The goal of all these emails is the same–to get you to do something that benefits the fraudsters on the other end, such as sending them money [sometimes by installing ransomware on your computer] or giving up your login usernames, passwords and account numbers or your DOB, Social Security number. Phishing is also a common way that cyber criminals obtain access to company computer networks, including a law firm's network, from which they launch a larger attack.

The Federal Trade Commission provides resources to help businesses –including attorneys–address cybersecurity, including the risks posed by phishing. Check out the FTC website here. Specific advice concerning phishing attacks can be found here and here. They include calling the sender or a colleague to verify the bona fides of the request, keeping computer security software updated and implementing email authentication technology.

In addition, Rob Kleeger, the Founder & Managing Director of Digital4nx Group, Ltd., a New Jersey-operated digital forensic investigation and national cybersecurity consulting and advisory boutique, recommends that businesses take several reasonable and cost-effective steps to begin to protect themselves from phishing emails and other cyber threats.

Pay attention to the sender's email address. Cyber criminals often mimic a legitimate business email address with only a character or two altered or omitted.

Hover over hyperlinks. Hover the cursor over any links in an email-those not matching the text that appears when hovering over them raise a red flag. Additionally, using a URL shortening service to hide the true source and destination of the link also raises a red flag.

Use complex and unique passwords. Use unique passwords for each account you own, with long character counts and a mix of upper and lower case letters and special characters. Using a password manager like LastPass, KeePass, Dashlane, and others is a good idea.

Enable Two-Factor Authentication (2FA). While two-factor authentication (2FA) isn't bullet-proof, it is an important line of defense against attackers who are trying to access your accounts after your credentials have already been compromised.

Cyber Awareness Training. Proper training which makes cybersecurity "personal" establishes a "human firewall" and is the best method for personnel to embrace a cyber culture.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

ARTICLE
16 October 2019

Lawyers: Beware Of Phishing Emails

United States Technology
Contributor
Archer & Greiner is now Archer. But what matters most is what remains the same. Our new name still represents an unwavering commitment to delivering large-firm expertise with small-firm attention—no matter the size of the client. It’s a philosophy that’s helped us grow into one of the largest and most trusted law firms in the Mid-Atlantic region, serving businesses and individuals throughout the region and in a growing number of other states and jurisdictions. With a network of regional offices from Delaware to New York, Archer has more than 175 lawyers practicing in all major legal disciplines including corporate, labor, commercial litigation, family, real estate and many more.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More