The Onakee Group

Post Breach Response

cecb_slide01

One note: It should be the policy of all firms to report cyber crime. However, knowing there you have been breached, tracking the breach and compiling evidence can be timely and costy if the correct systems are not in place BEFORE a breach. Nevertheless, as data is colllected from the FBI, U. S. Department of Justice, "the collective impact is staggering". Billions of dollars are lost every year repairing systems hit by such attacks. Some take down vital systems, disrupting and sometimes disabling the work of hospitals, banks, and 9-1-1 services around the country.

Internet Crime Complaint Center (IC3)

This information is provided as an effort to minimize cyber crime. According to the FBI's website on cyber crime, the Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, and local level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.

01

Cyber Liability

“Cyber insurance coverage is a valuable and practical member benefit for lawyers offered through the ABA Insurance portfolio,” ABA President Linda A. Klein said. “As the number of cyber breaches increases everywhere and throughout all industries, it is critical that lawyers and law firms that rely on vast amounts of electronic data are protected.

02

Law Firm: Staff Training

Sherri Davidoff presented “Cybersecurity Training for Law Office Employees,” Everyone in your office should be trained, including lawyers, support staff, first-responders (IT personnel) and clients. Client portals for law firms are popular, but portal users must be trained, sometimes on a one-on-one basis.

03

Privacy Threat

Governments as well as private sectors has largely missed out on that transformation of data protection due to poor management of technology investments, and taking years longer than necessary to deploy, and delivering technologies that are obsolete by the time they are completed.

Get Started Learn More