
Sometimes, while cleaning out filing cabinets and drawers of attorney business-owners, I come across funky time-saving devices like a dictaphone… yes, a dictaphone and I am reminded of the newness of technology and the sheer volume of efficiency that has resulted from its advances. While some lament at the ease of foot pedals that rewind and play verbal notes for paralegals to type and that talk-to-text doesn’t ever get it right, they also realize that Siri doesn’t have a salary and the edge that technology provides is worth the hassle.
As we enter this brave new world of Amazon cart items showing up in our Facebook feed and unprompted morning reminders regarding the length of time it will take to get to work, it is easy to be intimidated and logical to fear that someone, not named us, has too much of a window into our daily life and business.
A quote that I often use when discussing technology is “If it’s free, you’re the product.” We are all aware that some sort of trade-off in privacy and security occurs for the convenience and efficiency we experience. We are trusting social media companies with our most intimate details because it provides closeness to friends or family that we would not have otherwise; we are assuming that companies care so much about their image and reviews that they will do what is right; and we are outsourcing entire aspects of our life and business to others, whether personally known to us or not. What I find and fear more though is that we don’t always know what that trade-off is. Moreover, for every advancement in our efficiency through technology there is an increased opportunity for someone, who may or may not even know us, to steal from us or harm us.

As a law-firm service provider, I am constantly seeking current information that will further our desires and duties to not only provide legal services in the most efficient way possible but also to keep our information and the information of our clients safe. Below I have put together a quick list of current technological threats and what you can do to protect against them:
Phishing
The folks at Merriam-Webster must be busy as they continue to add definitions for computer-related words such as this one, defined as “a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly”. Most of us are aware of and know not to respond to an email or call from suspicious sources asking for additional account information or requesting money in order to avoid penalties but what if that email came from our boss or looked exactly like an email from our bank? As our awareness of these types of attacks increases, so does their sophistication. I find it best to regularly seek information on current types of attacks and then ask a certain set of questions before giving out any important information.
Malware and Ransomware
Until recently, hacking and malware attacks have seemed like a problem for big businesses and financial agencies with important data, not something for the mom-and-pop shop down the street to be concerned about. Unfortunately, the culmination of data as a currency and algorithms that troll means even the little guy has to worry about getting hacked.
Consider this: You’re typing away at your latest proposal or reconciling last months financials when your screen goes blank except for a message that says your entire hard drive has been taken over and you have a number of hours to wire money to the attacker before they delete everything on your computer. This attacker has no interest in your information, except possibly selling it on the dark web for about $50, and they don’t care about who you are or what you do because “they” are an algorithm. The person who set this virtual criminal loose to infect your property does know that your information has value to you. This is what we call Ransomware.
The first thing that comes to mind in this case should be “when did I last back up?” if you have a current back up you are in a much better position to maneuver this attack successfully. Without a back up, you are at the mercy of your bandit algorithm and its creator to do the right thing whether you decide to pay them or not.
Password Theft
This is a tricky one. I think we are all guilty of using the same password across platforms and sometimes sharing passwords with trusted others. In a team setting, this is almost necessary since multiple people may need to access one account and, lets face it, you have to trust someone right? While there are external attackers that can infect you with key-stroke tracking and steal your passwords, the risk of password theft really is in these convenience trade-offs. Each of us has weighed the risks of password theft with the ability to remember one password instead of 100 and have established our comfort level in sharing them with others.
Internal Breach
We discussed the concept of trust above with regard to password sharing but that is not the only area where your trust in someone, especially a team member, can open you up to security issues. There are many ways that a team member can take advantage of their position or unknowingly open you up to information-related risks.
Stay informed and plan ahead.
As computers become the prevailing method of doing business and information becomes it’s own type of currency this area of theft and deception will only grow. If you don’t have an IT person on staff or at least on call, consider getting one. Always back up and invest in a plan for the unfortunate but likely scenarios of sustaining a digital attack.
By entering your email, you agree to receive marketing and educational emails from Framework Legal and acknowledge and consent to our Terms of Use, Legal Disclaimer, and Privacy Policy.