Did you know Fastcase is mobile? Use your legal research member benefit at work, at home or on the go! Search for the Fastcase app in the Apple App Store, Google Play Store or Microsoft Store for more information. Click here for instructions on how to sync your mobile account with your South Carolina Bar account. For login assistance to access your SC Bar Fastcase account, contact email@example.com or call (803) 799-6653, ext. 118 or 183.by
Technology continues to produce amazing things in many areas of life, from medicine to new law office software. But to read all the headlines about “cyber attacks” your instinct might be to shut down your computer and read a book. Still, as lawyers, we need to know about the very real threats out there that are trying to target lawyers specifically. For example, the FBI has repeatedly issued warnings to law firms that they are highly vulnerable to malware attacks. Large firms have been hit already, such as two firms representing a number of Fortune 500 companies and Wall Street Banks. Smaller firms are not immune to attacks. On the contrary, the Bar has received numerous reports from South Carolina small firms that have been successfully targeted by malware, including ransomware — software that encrypts the data on the user’s computer or entire network. You must pay the “ransom” if you want your data decrypted or have a good complete backup.
Ransomware is just one form of malware that usually enters a firm’s computers through “social engineering,” a fancy way of saying an employee was tricked into clicking on a link that unleashed the bad bug.
Security experts claim that most attacks launched on computers these days are not “blunt force attacks” but are a result of social engineering. So, let’s examine some of these cybertricks, starting with phishing. Phishing can start with a phony email, purporting to be from someone it’s not, containing a link allegedly going somewhere that it’s not. (Spearfishing scams are emails that appear to come from someone you know who knows a little about you.) The trouble begins when you click on the link and go to an infected website, or the link itself may contain the malware. It’s important to know that once the action is taken, it can’t be undone.
One more type of phishing: a whaling attack. Users are made to believe they are receiving an e-mail from the head of the organization, but, as you probably guessed, the e-mail is from a phisher.
So, what’s busy law office to do? First and foremost, educate everyone in the firm who touches a computer. Here are five ways to do that:
- Give employees a list of e-mail addresses throughout your firm and keep it updated when e-mail addresses change. Keep the list up-to-date when employees leave, someone gets married, or new employees join. If an employee receives an email from inside the firm that is not on the official list, they should delete it.
- Train employees to understand domain names (generally the part of the Internet or email address that comes before “.com.”) Phishers like to change real domain names slightly by adding a number or letter onto the address. Make sure all employees routinely check domain names carefully.
- Train employees to know the popular “catch phrases” used by phisher and whalers, and avoid using these phrases in staff emails. Here are a few popular catch phrases:
- Too busy to talk
- Need the money fast
- I said immediately
- I would gladly pay you Thursday for _____ (fill in the need and the time)
- Train employees to be EXTRA careful when replying or sending e-mail to free e-mail accounts (examples include, but are not limited to, Gmail, Yahoo, Hotmail, etc.)
- Phishers love to change e-mail addresses to look valid. For example, instead of an e-mail going to firstname.lastname@example.org – a phisher would make a phishing e-mail go to email@example.com. Notice the firm name has been completely removed.
- Verify e-mail addresses with any sender/recipient who uses free e-mail accounts. Pick up the phone and confirm that they were the authorized sender/recipient and they are the only ones who can access this information.
- Hire an IT security professional to conduct a security and cyber-risk audit of your firm. For additional online security, take the following safety measures:
- Ensure you back up files regularly and keep recent backups off-site
- Lock down social media accounts
- Set security settings on all accounts to the highest setting possible. Avoid making profiles public
- Do not post unnecessary information like birthdays, information only you or close family would know, etc. Keep information at a minimum and keep your confidential information secret.
- Train employees to use caution when opening unsolicited e-mail attachments
- Patch & update all software and online tools
- Use stronger passwords – at least fourteen characters and a mix of numbers, letters and symbols
- Deploy strong spam filters that detect viruses, blank senders, etc.
- Use security software including firewall, antivirus software and web filters
- Encrypt all sensitive company information and require employees to use encryption when sending company information
- Make sure you have a good cyberinsurance policy
Also, check out these other ways you can prevent phishing scams, whaling attacks and cybersecurity conundrums. Contact us to help answer any practice management or technology questions for free at firstname.lastname@example.org and don’t forget to save the date for the upcoming LPM-TECH (Solo and Small Firm Conference) on September 16, 2016. There will be a variety of cybersecurity professionals on hand to discuss these topics plus more. Register now.
Written by: Courtney Kennaday, Director, PMAP and Emily Worley, PMAP Assistant, South Carolina Barby
What do clients say about your services? Client feedback is a crucial component in increasing client satisfaction and loyalty, just like any business.
Whether you gather client feedback through realistic discussions or provide general surveys, not only is it important to gather information, but also, to understand what clients are expressing. By doing so, this allows you to make changes to not only to your services and systems, but also to how you deliver services and systems to clients.
Here are a few questions to ask clients about the services you provide. Also, check out these three simple tips from Ruby Receptionists to make every client’s experience great and another article on how to become a trusted advisor from Attorney at Work.
Consider that by positively improving your client’s experiences, clients will share their positive thoughts and feedback with others. This in turn, will hopefully lead to increased firm profits, not from higher rates and fees, but by simply hearing what clients are saying and making it your goal to provide quality client experiences through your own clients’ feedback.
Written by: Emily Worley, PMAP Assistant, SC Bar
Edited by: Courtney Kennaday, Director, PMAP, SC Barby
If you have technology or practice management questions, the Bar offers a free help desk for Bar members at email@example.com or 803 799-6653 ext. 183.by
Bankers, accountants, financial advisors, physicians, realtors, and even other attorneys can all be a good referral source. It’s important to maintain regular contact with other professions so that your practice is the first source they think of. Here are six great tips to build your networks from Tips for Lawyers and a few tips on how to master the meet and greet (Attorney at Work). Check out other great networking resources in the South Carolina Bar Lending Library and don’t forget to join the Solo and Small Firm Section. The Section is a great way to receive discounts on select CLE’s, participate in the members-only listserv, meet other solo and small firm attorneys across the state, not to mention lots more! E-mail firstname.lastname@example.org for more information.by