“Solicitors should not use email at all”

In an article in Computing News last year about the warning ICO issued to the legal profession after a series of data breaches, Richard Anstey, CTO EMEA for collaboration tools provider Intralinks, was asked for his input on ICO’s top tips for barristers and solicitors. computerHe said the following:

“instead of ensuring email is encrypted or password-protected, solicitors should not use email at all”

You can read what he recommends using instead in the article in Computing News.

7 out of 10 UK law firms affected by cyber crime in 2014?

The Solicitors Regulation Authority (SRA) has reported that in 2014, nearly 70% of UK law firms reported a cyber security incident.

cyber security guy or hackerRead more: here.

The first half of the article focuses on bogus law firms. The second paragraph under the ad is about how cyber crime affects law firms.

 

Uber Technologies – not a law firm – has billions at its disposal; that allowed it to do some investigating that enabled it to file a John Doe lawsuit after its recently reported hacking incident. Which it discovered about half a year after the fact and then kept silent about for another six months. Give or take a few days.

Data security in the legal profession

ICO, the Information Commissioner’s office, issued a warning last year after several data breaches at law firms.

circuitAccording to the ICO, there were fifteen reported incidents of data breaches in the legal profession within a period of three months.

You can read more about it in this article in the online magazine Computing News and on
this article on the ICO website as well as in this pdf file by ICO.

  • How many legal professionals have ever built a computer from scratch? I have. It worked fine right away, too. (To my own amazement.)
  • How many legal professionals were taught a little bit of computer programming at university? I was.

Hacker update

Today, he is playing violin sounds and the sounds of footsteps in gravel on this computer.

mellow

Grab a chair, a steaming mug of coffee and some chocolate chip cookies and pull up to my desk for a good real-life story about my hacker.

He – or maybe, they, because when people hide in anonymity, who’s to say who it really is – seems to love that theme. Around Christmas, he also played the sound of approaching footsteps in gravel (and the sounds of a crackling fire). I think I’ve heard him play the footsteps before that, too.

But you’ll forgive me if I haven’t kept track of all the sounds he’s played on my computers in nearly seven years’ time. In the past, he has done something similar with train stations along the route Bristol-Portsmouth. The approach theme.

I have no idea what it is all about. These true-life tales from my desk may help keep my readers entertained, however. That way, I can put this to some good use. Enjoy!

PS
Last week, he used YouTube sound in Chrome to flood sounds into this computer. Today it’s the BBC iplayer’s sound in Chrome. That is, these sound channels are not working and it coincides with the hacker feeding sounds into this computer. I wonder how he does that…!

Loophole in Seagate’s Business Storage 2-Bay NAS products

If you use one of Seagate’s Business Storage 2-Bay NAS products, you will want to hear this. It may concern all versions up to 2014.00319 but certainly

  • Business Storage 2-Bay NAS version 2014.00319
    and
  • Business Storage 2-Bay NAS version 2013.60311
The vulnerability allows unauthorized root access. Seagate knows about it but has kept quiet about it, alleges this article in the Hacker News.

Another mark against Uber

There are many misgivings regarding the app-based taxi company Uber. One of those is a belief that Uber’s databases will get hacked.

Apparently, they already did. Get hacked.

Uber found out four months after the fact and kept quiet about it for months afterward. Last Friday, it finally came clean. In the New York Post, you can read more about Uber getting hacked.

Uber has meanwhile started a lawsuit against the hacker, identifying him or her as John Doe. This is also how you can sometimes take action against anonymous internet trolls as the FindLaw blog explains.