For the Defense - Vol. 6 Issue 3 - 10

to prevent the inadvertent or unauthorized disclosure of,
or unauthorized access to, information relating to the
representation of a client. "
The " reasonable efforts " that an attorney must take to
protect confidential information have evolved through
the years as technology has advanced. Ten years ago, the
Pennsylvania Bar Association issued a Formal Opinion
on the Ethical Obligations For Attorneys Using Cloud
Computing/ Software As A Service While Fulfilling The
Duties Of Confidentiality And Preservation Of Client
Property, Pa. Bar. Assoc. Formal Opinion, 2011-200. While
the advice in that Opinion is still timely and helpful, as
ransomware attacks grow more frequent, the duty to
prevent them becomes more urgent, and the failure to
do so borders on negligence or even malpractice.1
The use of phishing emails to install malware that
deprives a user from accessing their computer files has
been at the center of demands for " ransomware " in many
of the most notorious ransom schemes. In 2020 alone,
victims paid nearly $350 million worth of cryptocurrency
in ransom. Again, and again, sophisticated organizations
have been subjected to demands for payment of " ransom "
after an employee unwittingly opened an attachment to
an email leading to an infection of the company's network
and spreading all through the company's systems.
Most solo attorneys and small firms are aware of
cybersecurity threats, but they tend to overlook the
severity or likelihood of an attack. However, even the
solo criminal defense lawyer is holding confidential and
sensitive information on their computer and is at risk. The
danger has increased with our dependence on employeeowned
hand-held devices and our expanded use of
remote work. Each new location and separate device
becomes an opportunity for infiltration.
What's a solo or small firm lawyer to do in the face of this
wave of cyber-crime? Here are some simple suggestions
for a basic cyber-security program:
1. To see where your vulnerabilities are, and
how to fix them, start with a cyber-security audit.
There are cyber-security experts who will review
your software and hardware, assess how secure
you are and what you need to do to improve your
security. For solo and small firms, this can be very
cost-effective, as the scope of your systems are
likely not complex.
2. Change your passwords frequently and
be sure to reset the default password on any
new hardware. Wherever possible use two-step
authentication to access important websites,
especially when accessing online IOLTA accounts.
Keep your passwords in a secure " passport vault "
like 1Password, Dashlane or bitwarden (free).
3. Train your staff. As discussed above, opening
an infected email, clicking on a phishing link,
visiting an infected web site with no browser
security, or using a public internet access point
without adding your own VPN security, are all
examples of conduct that creates the greatest
risk, but is easily avoidable with the proper staff
training.
4. Keep all your software updated. Make sure
that you are installing the latest security patches.
5. Install Antivirus/Malware protection
software, such as Next-Generation (NGAV).
6. Include a provision in your engagement
letter that both parties agree to the use of
email to communicate, despite the known
risks. Discourage a client from resorting to text
messages to communicate on substantive issues.
(This is as much for counsel's sanity as it is security.)
7. Use an email filtering solution designed to
prevent phishing or ransomware attacks (e.g.,
Microsoft Advanced Threat Protection or Office
365 Microsoft Defender).
8. Be careful with thumb drives. Only use
removable drives that you are familiar with or
that come from a trusted source. If a drive has
been used in publicly accessible devices, like
10 For The Defense l Vol. 6, Issue 3
https://www.lifewire.com/disable-windows-remote-desktop-153337

For the Defense - Vol. 6 Issue 3

Table of Contents for the Digital Edition of For the Defense - Vol. 6 Issue 3

Contents
For the Defense - Vol. 6 Issue 3 - 1
For the Defense - Vol. 6 Issue 3 - 2
For the Defense - Vol. 6 Issue 3 - Contents
For the Defense - Vol. 6 Issue 3 - 4
For the Defense - Vol. 6 Issue 3 - 5
For the Defense - Vol. 6 Issue 3 - 6
For the Defense - Vol. 6 Issue 3 - 7
For the Defense - Vol. 6 Issue 3 - 8
For the Defense - Vol. 6 Issue 3 - 9
For the Defense - Vol. 6 Issue 3 - 10
For the Defense - Vol. 6 Issue 3 - 11
For the Defense - Vol. 6 Issue 3 - 12
For the Defense - Vol. 6 Issue 3 - 13
For the Defense - Vol. 6 Issue 3 - 14
For the Defense - Vol. 6 Issue 3 - 15
For the Defense - Vol. 6 Issue 3 - 16
For the Defense - Vol. 6 Issue 3 - 17
For the Defense - Vol. 6 Issue 3 - 18
For the Defense - Vol. 6 Issue 3 - 19
For the Defense - Vol. 6 Issue 3 - 20
For the Defense - Vol. 6 Issue 3 - 21
For the Defense - Vol. 6 Issue 3 - 22
For the Defense - Vol. 6 Issue 3 - 23
For the Defense - Vol. 6 Issue 3 - 24
For the Defense - Vol. 6 Issue 3 - 25
For the Defense - Vol. 6 Issue 3 - 26
For the Defense - Vol. 6 Issue 3 - 27
For the Defense - Vol. 6 Issue 3 - 28
For the Defense - Vol. 6 Issue 3 - 29
For the Defense - Vol. 6 Issue 3 - 30
For the Defense - Vol. 6 Issue 3 - 31
For the Defense - Vol. 6 Issue 3 - 32
For the Defense - Vol. 6 Issue 3 - 33
For the Defense - Vol. 6 Issue 3 - 34
For the Defense - Vol. 6 Issue 3 - 35
For the Defense - Vol. 6 Issue 3 - 36
For the Defense - Vol. 6 Issue 3 - 37
For the Defense - Vol. 6 Issue 3 - 38
For the Defense - Vol. 6 Issue 3 - 39
For the Defense - Vol. 6 Issue 3 - 40
For the Defense - Vol. 6 Issue 3 - 41
For the Defense - Vol. 6 Issue 3 - 42
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol9_issue1_2024
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol8_issue4_2023
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol8_issue3_2023
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol8_issue2_2023
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol8_issue1_2023
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol7_issue4_2022
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol7_issue3_2022
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol7_issue2_2022
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol7_issue1_2022
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol6_issue4_2021
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol6_issue3_2021
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol6_issue2_2021
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol6_issue1_2021
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol5_issue4_2020
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol5_issue3_2020
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol5_issue2_2020
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol5_issue1_2020
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol4_issue4_2019
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol4_issue3_2019
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol4_issue2_2019
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol4_issue1_2019
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol3_issue4_2018
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol3_issue3_2018
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol3_issue2_2018
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol3_issue1_2018
https://www.nxtbook.com/nxtbooks/pacdl/FORTHEDEFENSE_vol2_issue4_2017
https://www.nxtbook.com/nxtbooks/pacdl/FORTHEDEFENSE_vol2_issue3_2017
https://www.nxtbook.com/nxtbooks/pacdl/FORTHEDEFENSE_vol2_issue2_2017
https://www.nxtbook.com/nxtbooks/pacdl/FORTHEDEFENSE_vol2_issue1_2017
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol1_issue4_2016
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol1_issue3_2016
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol1_issue2_2016
https://www.nxtbook.com/nxtbooks/PACDL/FORTHEDEFENSE_vol1_issue1_2016
https://www.nxtbookmedia.com