Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber awareness training within the legal industry must be the first-line of defence against online scammers, warns Databarracks

by The Gurus
January 21, 2019
in Editor's News
Share on FacebookShare on Twitter

For the legal industry to effectively address the rising threat of online scams, cyber awareness training amongst staff must act as its first-line of defence, according to business continuity and disaster recovery service provider Databarracks. This follows recent findings from the Law Society, which revealed that more than a quarter of law firms in England and Wales were targeted by fraudsters last year, with most of the attempted scams taking place online.

Peter Groucutt, managing director for Databarracks comments: “It’s unsurprising to hear that the legal sector is vulnerable to online attacks. The fast-paced nature of the industry combined with the high-volume of email traffic means that it only takes one person to open an unsolicited email and attachment to compromise an entire organisation.

“The Law Society is right to highlight this growing threat and also encourage firms to review risk management practices, but importantly, senior management teams within these firms shouldn’t make the mistake of assuming that this is solely a technology issue that needs to be addressed. For any organisation, the first-line of defence against cyber threats starts with your staff and this must be supported with effective cyber awareness training.”

Groucutt continues: “In practice, make sure that your team is able to identify potential phishing emails as well as the recommended procedures to follow in the case of a breach or infection. This can help to get incidents under control quickly, reducing the amount of damage caused. For smaller practices, which typically might not have the necessary infrastructure or personnel in place, schemes such as the government’s Cyber Essentials Scheme (CES) provides advice and guidance for those looking to take their first steps into cyber-security and also supports those who are simply looking to improve existing processes.

“A lot of IT departments handle incidents in the background with only key senior individuals being informed, but if threats aren’t communicated internally to employees then how will they understand the dangers facing the business? Because of this, an effective line-of-dialogue between the IT department and the rest of the business is needed. This not only serves to alert an entire organisation to threats, but allows the IT team to understand whether security processes are too restrictive or unintuitive, hindering the staff’s ability to do their jobs competently. Asking these questions to the right people will go a long way to improving adherence to IT security practices.

“Additionally, this needs to be supported with effective backup capabilities. The fallible nature of people means that in the event of an incident an organisation needs to know that its data can be retrieved, but often this is hindered by the technology in place and also how thinly the IT teams are spread. A firm’s IT team might have priorities elsewhere for example, handling hardware upgrades or managing new software installations. Because of this, backup can become an afterthought and often this is where a firm’s downfall can lie.

“You need to ensure backup works for you when you need it to, and because of this it needs to be managed, monitored and tested regularly,” Groucutt concludes.

FacebookTweetLinkedIn
Tags: cyber awarenesscybersecurrityDatabarrackstech
ShareTweetShare
Previous Post

Ransomware on the rise: how to prevent an attack

Next Post

Over 28,000 devices decrypted and 100+ global partners – No More Ransom celebrates its first year

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information