This article appeared in Cybersecurity Law & Strategyan ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.

Consider this scenario: You’re a law firm accountant. Early one morning while reviewing emails, you see a message from the firm’s real estate agent stating that the landlord has agreed to your latest counteroffer and is ready to move forward on the rental of your new office space. You continue discussions to finalize the deal, work on signing the paperwork and are ready to send over your deposit. A new email from the agent at the last-minute mentions changing banks and encloses updated wiring instructions. The email has a sense of urgency to send the information quickly or the deal may fall through. Looking at the email, it appears legitimate, and you’ve done two other deals with this agent in the past, so you feel comfortable with the request. You reply to the message confirming the change, the response says to move forward. And all appears well.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]