Cyber Security Blogs

Protect your law firm from cyber attacks. Our top informational blogs below identifies the best cybersecurity solutions that every business and law firm should keep top of mind.

Read now!

Santa Barbara Lawyer

Santa Barbara Lawyer

John Troxel recently wrote an article that was carried in the Santa Barbara Bar magazine on why cyber security specialists should be engaged.

Digital Spring Cleaning

Digital Spring Cleaning

Most of us are so looking forward to spring! The landscape starts to take shape, flowers start to bloom, and, for many, there’s a desire to spring clean. While it might be easy to see the need to purge and tidy up, realizing the need to also digitally declutter isn’t...

Back at the office? Watch out for piggybacking!

Back at the office? Watch out for piggybacking!

To kids, piggybacking is when someone jumps on your back and you carry them around for a while. In the business world, piggybacking is when you let someone that you do not know enter a door that you just opened. In cyber security speak at a law firm, that is when an...

Don’t be an Easy Target

Don’t be an Easy Target

Don’t be an Easy Target! 29% of cyber attempts against small businesses are successful . . . so if you are the target, there is almost a one in three chance you’ll be compromised.  Too small of a business, you say?  43% of all cyber security attacks are against small...

You’ve Been Hacked. Now What?

You’ve Been Hacked. Now What?

Have I Been Hacked? No matter how cyber security conscious you are, sooner or later you or your law firm may have an accident and become the target of a data breach. Below are clues you may have suffered a data breach and if so, what to do. Your Online Accounts...

Do you actually have good backups?

Do you actually have good backups?

If you use a computer or mobile device long enough, something will eventually go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, a cyber security attack, such as ransomware, may wipe your files and/or hold...

Be Protected with MFA

Be Protected with MFA

The word is out: insurance companies pay ransoms to cyber criminals. There is no “we don’t negotiate with terrorists” line drawn in the sand. Cyber security is breached, cyber criminals take over mission critical data, and insurers pay out on their cyber insurance...

Getting Scammed Through Social Media

Getting Scammed Through Social Media

Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take,...

How Attackers Bypass Multi-Factor Authentication (MFA)

How Attackers Bypass Multi-Factor Authentication (MFA)

IT security tactics are constantly changing and trying to stay one step ahead of hackers, advanced persistent threats (APTs), and other malicious actors, is a constant game of cat and mouse. According to the 2019 Symantec Internet Security Threat report, 1 in 412...

VRICyber

Expert cyber security for small to medium sized businesses.

Cybersecurity for law firms and lawyers