“Our QNAP NAS server was hacked and encrypted. Please help! Can we recover our data?” Here is how you can recover files from a hacked and encrypted NAS server. It doesn’t necessarily need to be QNAP – but that brand was hit particularly badly in June 2020. Please take note – the server is a … Read more Here is what to do if hackers encrypted your NAS server
Significant losses can occur if you choose your information security consultants at random and have no clear plan and strategy of working with them. Here is a procedure for selecting a consultant, working with them, and controlling their performance throughout the duration of your project. Efficient work means clarity of expectations on both sides and proper controls … Read more Information Security Consultants Require Efficiency Controls To Be Effective
Exploits and malware – sometimes even highly advanced ones – are distributed via ad networks and hacked websites. And while you can’t control the latter even if you have a whitelist policy on your web proxy, you can control which ads are seen in your network. Malvertising The term means serving malware via ad networks. … Read more Block exploits and malware by blocking ad networks and ads
The common elements across all law firms when it comes to protecting them from hacking attacks are: Your document management system Your case management system Your filing system Printing management systems File sharing and collaboration Phone management systems Email – and in many cases, if a hacker gains access to someone’s email, they also gain … Read more Six ways to protect your law firms data
Every country in the European Union has its own local cybersecurity consulting companies. Atlant Security is one of them. How to identify a good cybersecurity consulting company? The most important criteria when making a selection between several cybersecurity consulting companies is their business model. Do they primarily perform penetration tests with the aim of reselling … Read more Top 10 of the best european cybersecurity consulting companies
Covid-19, or as it is otherwise known, the coronavirus forced us to live and do business in a new way which may quickly become ‘the new normal’. Are you ready to handle the new coronavirus cybersecurity issues? In this article we will share the challenges our clients face and how we helped them solve them, … Read more Are you concerned about these 10 coronavirus cybersecurity challenges?
Constant improvement is what your adversaries master at. Even though you might go for a new certificate from time to time – this is not the improvement I am talking about. Webinars are not improvement. Good, old-school reading and putting what you learned into practice is going to make you a master of your craft. … Read more Becoming a cyber knight: learn!
☠ Remote work has increased cybersecurity incidents by 25% and the majority of them are caused by pirated software or software downloaded by people from shady locations. I’ll give you an example: Previously while in the corporate network, people were (hopefully) prevented from downloading programs/binaries, instead, the IT department was doing that for them. Now, … Read more Risks of working from home for law firms
It really takes less than 5 minutes, all a hacker needs to do is: obtain a database of all your email addresses (30 seconds) – this can be done legally from many free and paid email marketing services visit your webmail page and copy it (30 seconds) to their automated attack toolkit craft a fake … Read more It takes 5 minutes to hack any email in your law firm
Commercial law firms are one of the most lucrative and information-rich targets a hacker could have and most of them have never had a CISO nor used CISO as a Service to protect them. They are the object of attack by foreign governments (when the details of a deal are of interest to one or … Read more Protect your law firm from hacking attacks