top of page
CaseBytes features content in cyber security best practices, research, threat intelligence, evolving threat activity, and advanced digital forensics investigations.
CaseBytes
Search
Nov 27, 20243 min read
Attorney Client Communication in a Cyber Landscape
The ABA Model Rule 1.4 emphasizes maintaining open, timely, and honest communication between lawyers and their clients. The outcomes can...
2 views
Nov 20, 20241 min read
New Administration Cybersecurity Shift: What Small Law Firms Need to Know
Upcoming administration's policies may reduce regulatory pressures, law firms should remain vigilant and strengthening their cybersecurity.
1 view
Nov 16, 20243 min read
The Duty of Competence in the Digital Age - 5 practical cyber security considerations for law firms
ABA Model Rule 1.1 mandates legal proficiency and emphasizes staying abreast of technological advancements to protect client information.
7 views
Nov 5, 20243 min read
Safeguarding Client Confidentiality
Safeguarding client data is vital. Understand ABA Model Rule 1.6, to cybersecurity, and ensure ethical protection of client confidentiality.
0 views
Aug 30, 20241 min read
Account management – What is it, and why is it important?
On a high level, it is the process to ensure that an organization only provisions accounts that are authorized to access data or...
5 views
Jul 3, 20241 min read
Back to Basics - Part 3: Cloud Services
The business signed up for a “cloud service” to gain efficiencies, reduce OpEx, etc. Security may not be included.
5 views
Jun 30, 20241 min read
Back to Basics - Part 2: Asset Protection
Devices or assets - think laptops, computers, mobile devices, tablets, or servers - are instrumental to performing daily business...
5 views
Jun 29, 20241 min read
Back to Basics - Part 1: Internet Access
Today we go back to the “basis” and discuss protecting the organization’s assets in a three-part series. You want to keep reading,...
6 views
Oct 24, 20232 min read
Safeguarding Trust and Confidentiality: The Crucial Role of Cyber Risk Mitigation in Mental Health
The mental health profession is facing a pressing challenge that goes beyond therapeutic techniques and patient care.
6 views
Jun 28, 20231 min read
Data Protection - Why is it important?
Good data asset protection considers a “least privilege” approach.
4 views
Jun 27, 20231 min read
Why is an "Asset Inventory" important?
News reports, breach reports, and studies show that many attacks are successful because organizations do not know their digital assets,...
3 views
May 8, 20233 min read
Protecting Your Business: Why Cybersecurity is a Critical Business Investment Right Now
Investing in cybersecurity is crucial for the long-term success of any business in today's digital landscape. Find out how.
14 views
May 5, 20232 min read
Patient confidentiality at risk – Be mindful and set up space for cyber security
Access to patient data by unauthorized 3rd parties has HIPAA, confidentiality, and potential legal implications with DORA.
5 views
May 1, 20233 min read
ABA data breach exposes account information of 1.4 million members
On March 6, 2023 an unauthorized 3rd party gained access to a legacy system operated by the American Bar Association (ABA).
13 views
Mar 9, 20232 min read
Healthcare sector under active attack
On March 4, 2023, a ransomware gang known as BlackCat threatened to release patient data stolen from a healthcare provider.
9 views
Mar 6, 20232 min read
Cyber Criminals Target Law Firms
Cyber-criminals focus their campaigns on law firms. Cyber threat intelligence shows that law firms are at increased risk of cyber attacks.
13 views
Aug 21, 20206 min read
Skeletons in Your Client’s “Digital Closet”
In only 3 days eye-witnesses forget over 77% of the facts associated with an incident.
28 views
Aug 18, 20203 min read
Hackers target law firms
Hack-for-hire mercenary hacking group targets law firms. Find out what this means and what the American Bar Association (ABA) has done...
39 views
Jun 29, 20202 min read
Crucial information retrieved from Apple iTunes backup
A Denver law firm retained our services to assist in a child custody matter involving SMS/iMessage communication.
28 views
Jun 1, 20202 min read
Nearly 1,000 user profiles deleted!
Client noticed irregular and random deletion of user profiles throughout their entire operation.
16 views
bottom of page