Blog Authors

Latest from Attorney at Law Magazine

The increasing popularity of cryptocurrency is creating an enticing opportunity for people to hide money and assets offshore, before the calculation of the equitable distribution of assets in a divorce, when a bankruptcy trustee is looking for hidden assets and non-disclosures or when restitution is required from a defendant in any number of civil or criminal proceedings.
If you are

After a person or a business has been the victim of a cyberattack or cybercrime, it’s unlikely that the cybercriminal will be caught. But in some cases, the victim may have a legal course of action that will require a forensic evaluation by an expert witness such as my firm.
I’m asked to review evidence to determine my expert opinion

Passwords are the root cause of over 95% of data breaches. Just addressing password problems will go a long way toward providing your firm with a level of cybersecurity.
One of the newer security protocols to alleviate the need for passwords is FIDO which stands for Fast IDentity Online. It’s a set of authentication standards aimed at strengthening the user

Unless you are an IT or cybersecurity techie like me, you may be afraid of new technology. I recently spoke with Catherine Sanders Reach, director for the Center for Practice Management at the North Carolina Bar Association, about the pain points for attorneys when instituting new cybersecurity technology.
CP: Cyberattacks on law firms of all sizes have been well-documented. Why do

“Are you encrypting your hard drives, are you encrypting your servers, are you encrypting your data in transit and in storage? the answer should be yes,” Catherine Sanders Reach, Director of the NCBA Center for Practice Management told me recently.
She had just published an article in the NCBA From the Center blog about encryption. In our conversation, we touched

I speak to students at NCCU School of Law every semester about cybersecurity for their practices. I start with the supposition that they will be starting a solo practice. They will be using a new or relatively new computer and new law practice management software. I also assume they don’t know a lot about cybersecurity.
I tell law students that

As the digital age has transformed the way we access goods, services, and information, the ease that comes with doing nearly everything online comes with a significant cost—a lack of privacy.
Just think of all the data on the web, waiting for hackers to exploit it. Bank account information, health records, driver’s license numbers, Social Security numbers, and more, maybe

The Department of Defense’s (DoD) Office of the Under Secretary of Defense for Acquisition and Sustainment recently issued a long-awaited overhaul to its Cybersecurity Maturity Model Certification (CMMC) program by introducing CMMC 2.0, which:

  • Lowers the number of CMMC levels from 5 to 3.
  • Drops all maturity PROCESS requirements.
  • Allows (limited): Self-attestation of compliance and Plan of Action and Milestones (POAMs)

To

This year has seen an escalating series of high-profile ransom-ware attacks impacting businesses in a variety of sectors. After this most recent revelation, however, it would behoove law firms, specifically, to be on high alert for emerging cyber threats.
In a July 2021 disclosure on its website, major national firm Campbell Conroy & O’Neil alerted its clients to a ransomware

Halfway through 2021, ransomware attacks are on the rise, and more companies are publicly disclosing the incidents. In addition to the nationally reported Colonial Pipeline attack, which temporarily shut down gas deliveries on the East Coast and sparked panic buying, many other high-profile attacks occurred, targeting both private companies and public agencies.
Also making headlines this year were attacks on