The Danger of Using Legacy Protocols for Business Email

Criminals attempt to compromise business email accounts more often than you may think. When they succeed, large amounts of money can disappear. Generally,…

How Your Law Firm Should Handle Data Privacy

More and more, law firms are receiving inquiries from potential clients about how the firm protects data privacy. These prospects are usually large…

Why use Multi-Factor Authentication with Office 365?

Sometimes, a simple username and password isn’t enough to protect your information. Multi-Factor Authentication, or MFA, is a recommended security…

5 Reasons You Can’t Skimp on Cybersecurity Education

Your employees are your strongest line of defense…and your weakest link. The biggest risk to your organization’s cyber security posture is your employees,…

The Role SOC Services Play in Your Cybersecurity Posture

When the security community talks about an organization’s cybersecurity posture, they are talking about the ability to withstand attacks. In other words,…

Essential Protections: Endpoint, Wi-Fi and Data Security

During National Cybersecurity Awareness Month, we’re focusing on “back to basics” security. Here’s the third of our posts related to this year’s theme:…

Passwords, Passphrases and More: Back to Basic Security (NCSAM)

Since October is National Cybersecurity Awareness Month, let’s take a look at some of the security measures that are still often overlooked. As we…

Eight Steps to Mobile Device Security: NCSAM—Own IT

October is National Cybersecurity Awareness Month — a time when all of us in the cybersecurity industry work together to remind everyone about key…

Take My Computer, Please: How Remote Desktop Protocol (RDP) Can Endanger Law Firms

A system running Remote Desktop Protocol (RDP) is, for all purposes, an open invitation for cybercriminals. This protocol underlies Remote Desktop…

Wire Transfer Hijack: New Social Engineering Technique Targets Law Firms

Here at SOCBOX, we recently witnessed a new avenue for targeting law practices via social engineering. The cybercriminals would have made off with a nice…