Most folks ignore anything to the right of the “.” but Blue Coat warns about the explosion in TLDs and “created a list rating the web’s shadiest and safest neighborhoods” based “on analysis of web requests from more than 15,000 worldwide businesses and 75 million users.”  The Blue Coat August

Continue Reading CYBERALERT: .zip and .review are in the Top 10 Most Dangerous Top Level Domains (TLD)!

Infoworld recently reported about how folks can become anonymous on the Internet which comes in the wake of the 37 million individuals who were exposed in the Ashley Madison hack. The August 25, 2015 report was entitled “9 steps to make you completely anonymous online” and included these

Continue Reading Lawyers Looking for Witnesses & Evidence Need to Know About Internet Anonymity!

eDiscovery is the monster that ate Cleveland as everyone knows, but storing the ESI (Electronically Stored Information) is at risk to cyberintrusions since the ESI includes “highly sensitive information” as reported by my good friend Monica Bay in Legaltech News.  Monica’s August 18, 2015 story is entitled “Cybersecurity Infiltrates

Continue Reading Surprise! Cyberintrusions are Directed at eDiscovery Evidence

Lawyers should take advantage of Computerworld’s recent update to IT professionals about cyberinsurance which included Gartner’s definition of cyberinsurance “as protection against losses stemming from data theft and data loss, or business interruptions caused by malware or a computer malfunction.”  The Computerworld report entitled “5 things you should know

Continue Reading 5 Things Every Lawyer Needs to Know about Cyberinsurance!

A recent report warned that lawyers have an “ethical and regulatory responsibility to protect your client’s confidential information, it is imperative that you have a plan in place to protect your data from loss, corruption or theft.”  Abacus Data Systems issued its report entitled “10 Critical Disaster Planning Essentials

Continue Reading Alert to All Lawyers – Inevitable Data and IT Disasters May Destroy Client Files!

Since “99% of incident response and forensics is run through IT not counsel” businesses should follow Computerworld’s advice about managing cyberintrusions since “time is not a friend in any breach situation, companies that have cyber security attorneys on retainer are better positioned to quickly and efficiently respond to incidents.”  My

Continue Reading What a Great Idea – Keep a Cybersecurity Attorney on Retainer!