Pop quiz. How many of the following items are you familiar with?

  • Back door/trap door
  • Cracks
  • DNS poisoning
  • Eavesdropping
  • Hackers
  • IP spoofing
  • Malware
  • Man-in-the-middle spoofing
  • Network sniffing
  • Password cracking
  • Phishing
  • Ransomware
  • Replay attacks
  • Social engineering
  • Spam
  • Spyware
  • System penetration
  • System tampering
  • TCP/IP hijacking
  • Trojan
  • Tunneling
  • Viruses
  • Website defacement
  • Worms

When lecturing about or assisting law firms with cybersecurity issues, I ask them to tell me what each of these items is, and not surprisingly, no one has ever gotten a perfect score. In fact, no one has ever come close to receiving a passing grade. Of course not, lawyers aren’t trained to be cybersecurity experts. Yet cybersecurity—which is the process of protecting a computer or computer network against the criminal or unauthorized use of electronic data—is something every law firm needs to know about and to protect against.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]