How to make your email secure

Cybercriminals are intercepting emails between companies and their clients, deceiving customers out of life-changing sums of money and severely damaging the reputation of the organisation.

Targeted companies range from solicitors and conveyancers, to builders and traders.

In January this year, a charity worker buying his first home had his £67,000 life savings stolen after fraudsters hacked into emails sent between him and his conveyancing solicitor. Last year a London couple transferred over £25,000 to a fraudster posing as their builder after receiving a genuine-looking invoice, for an amount they were expecting, from a copycat email address. Read more

Secure Data Storage in a Cloud-Based Era

Is there an asset more valuable than your company’s data?

The need to keep off-site back-ups, seamlessly collaborate with others, and access data from any location has led to vast amounts of critical data being stored in third-party cloud-based services.

Your confidential data is such as Word documents, PDFs, spreadsheets, emails, contact lists and databases.

With hundreds of thousands of businesses placing these documents in cloud-based services like Dropbox or Microsoft One Drive, is it worth asking how secure they are? Read more

Who is the biggest risk to your company’s Cyber Security?

When an employee doesn’t care about cyber security

It doesn’t matter how thorough a business’ protective measures are, employees remain one of the biggest risks to an organisation’s digital security.

In some cases, it is not that employees don’t care about digital security, but that they don’t fully understand it.

An experiment in London’s financial district proved just how much of a risk employees can be to their organisations. CDs were handed out to commuters by employees of an IT skills company and told the disk contained a special Valentines’ Day promotion. In reality, the CDs contained code which notified the IT company how many of the recipients tried to open the CD. Despite clear warnings on the packaging about the dangers of installing third-party software and acting in breach of company acceptable-use policies, several city workers proceeded to run the disk. A major retail bank and two global insurers were among the organisations whose employees fell for the stunt. Read more

When Familiarity Breeds Complacency – How to Identify Authentic Emails

For many, a daily routine exists from the moment they sit at a desktop or take their first swipe of a tablet. It involves identifying important emails in your inbox and disregarding the spam. In most instances, this is a tedious yet simple task. We click on emails from contacts we know, or from organsiation we trust, and delete those we have no interest in. We look for the familiar and discard the unknown. It is a routine that drains time but a system that in the past has kept us reasonably safe from hackers. Repetitive yet necessary. Read more

The Imitation Game: Keeping Safe From Phishing Emails and Websites

A poorly written, plain text email requesting sensitive information arrives in your inbox from a sender you have not interacted with before. Without much thought you delete the email, writing it off as bogus.

Further down you come across an email with the subject: Update Your Account Information. In the sender column is your bank’s name. The HTML email is well formatted, using the colours, layout, font, and logo of your bank. The email states that as a security measure, you will no longer be able to access online banking unless you update your account information. Beneath this message is a hyperlinked sentence which reads, ‘Sign in to update your account information’. The email is signed from your bank’s customer service team. Read more

What Do You Need to Know Before Buying Cyber Insurance?

What do JP Morgan, Sony, eBay, Yahoo, Three, and Talk Talk have in common?

In the past two years, these companies have all been victims of cybercrimes and have experienced widespread media attention as a result.

An increase in cybercrimes, followed by an increase in media reporting of breached businesses, and moves towards tougher regulatory penalties, has created an emerging market for cyber insurance. Read more

GDPR: Are You Ready?

Having recently attended Legalex, the UK’s largest legal event for lawyers and law firms, it is clear the sector is not fully prepared for the General Data Protection Regulations (GDPR) due to come into effect in May 2018.

During round table discussions about the preparations firms are making in advance of the GDPR, responses ranged from firms only beginning to consider the impact it will have, to those who haven’t thought about it, or who are adopting a wait and see approach.

In just over a year’s time, when the new regulations are implemented, the consequences of failing to adhere will be severe, and ignorance will not be an excuse. Read more

The GDPR and Everyday Breaches

In just 12 months’ time, the EU’s General Data Protection Regulation (GDPR) will come into effect, replacing the UK’s current Data Protection Act. These new regulations will have a significant impact on the way data is managed.

The consequences of failing to comply with the GDPR are significant, with fines of up to 4% of a company’s turnover, or €20,000,000 – whichever is larger. With the clock ticking, it has never been more important to ensure robust systems for data management are in place. Read more

What Digital Security Measures Should You Be Thinking About as An In-House Legal Department?

If you work as part of an in-house legal department for a professional organisation, then your remit for protection is likely to be vast. Depending on the size and sector of the business, the legal work required will range from employment and contract negotiations, to commercial and marketing work. With so much compliance required to secure and safeguard companies against legal action, it is unsurprising that some protective measures fall through the cracks. Read more

Why Use A Digital Signature?

Whether receiving a document from a business partner, or downloading software from the internet, the ability to verify the integrity of a file is crucial. Documents that have been tampered with or created fraudulently pose a serious threat to any business.

A digital signature is a mathematical scheme for demonstrating the authenticity of a digital file. With a valid digital signature, the recipient of a document has reason to believe a known sender created it, and prevents them from denying sending it (authentication and non-repudiation). Like a tamper-proof seal, it also indicates that the document was not altered during delivery (integrity). Read more