The increasing popularity of cryptocurrency is creating an enticing opportunity for people to hide money and assets offshore, before the calculation of the equitable distribution of assets in a divorce, when a bankruptcy trustee is looking for hidden assets and non-disclosures or when restitution is required from a defendant in any number of civil or
Attorney at Law Magazine
Blog Authors
Latest from Attorney at Law Magazine
Expert Witness Forensic Evaluations After Cybercrimes
After a person or a business has been the victim of a cyberattack or cybercrime, it’s unlikely that the cybercriminal will be caught. But in some cases, the victim may have a legal course of action that will require a forensic evaluation by an expert witness such as my firm.
I’m asked to review evidence…
FIDO Stops Cybercrooks From Fetching Your Data
Passwords are the root cause of over 95% of data breaches. Just addressing password problems will go a long way toward providing your firm with a level of cybersecurity.
One of the newer security protocols to alleviate the need for passwords is FIDO which stands for Fast IDentity Online. It’s a set of authentication standards…
Overcoming Fear of New Technology
Unless you are an IT or cybersecurity techie like me, you may be afraid of new technology. I recently spoke with Catherine Sanders Reach, director for the Center for Practice Management at the North Carolina Bar Association, about the pain points for attorneys when instituting new cybersecurity technology.
CP: Cyberattacks on law firms of all sizes…
Cybersecurity Ethics Requirements
“Are you encrypting your hard drives, are you encrypting your servers, are you encrypting your data in transit and in storage? the answer should be yes,” Catherine Sanders Reach, Director of the NCBA Center for Practice Management told me recently.
She had just published an article in the NCBA From the Center blog about encryption.…
Cybersecurity for Law School Grads and New Firms
I speak to students at NCCU School of Law every semester about cybersecurity for their practices. I start with the supposition that they will be starting a solo practice. They will be using a new or relatively new computer and new law practice management software. I also assume they don’t know a lot about cybersecurity.…
Breaking News: Blockchain Security Trademarked
As the digital age has transformed the way we access goods, services, and information, the ease that comes with doing nearly everything online comes with a significant cost—a lack of privacy.
Just think of all the data on the web, waiting for hackers to exploit it. Bank account information, health records, driver’s license numbers, Social…
Cryptocurrency Security
Cryptocurrency’s growth in popularity is now (finally!) being matched by its growth in accessibility and with that growth has come increased issues of cybersecurity.
Until recently, those looking to buy, sell or trade cryptocurrency would have to go through the tedious process of getting set up on a cryptocurrency exchange; a process so unexpectedly cumbersome…
CMMC 2.0: What You Need to Know If You do Business with Uncle Sam
The Department of Defense’s (DoD) Office of the Under Secretary of Defense for Acquisition and Sustainment recently issued a long-awaited overhaul to its Cybersecurity Maturity Model Certification (CMMC) program by introducing CMMC 2.0, which:
- Lowers the number of CMMC levels from 5 to 3.
- Drops all maturity PROCESS requirements.
- Allows (limited): Self-attestation of compliance and Plan of
…
Law Firms at Risk: Ransomware Attacks on the Rise
This year has seen an escalating series of high-profile ransom-ware attacks impacting businesses in a variety of sectors. After this most recent revelation, however, it would behoove law firms, specifically, to be on high alert for emerging cyber threats.
In a July 2021 disclosure on its website, major national firm Campbell Conroy & O’Neil alerted…