<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

5 Top Cybersecurity Mistakes Law Firms Make

Small to midsize law firms have been increasingly targeted for cyberattacks. Hackers know that smaller companies are less likely than their larger counterparts to have sophisticated security protocols in place, and that law firm data is particularly valuable. The confidential nature of attorney-client relationships gives lawyers added motivation to pay a ransom to recover their sensitive data, which is not lost on bad actors. In fact, 24.9% of all ransomware attacks in 1Q 2021 targeted professional services firms, especially small and midsize law firms, according to Coveware. 

Topics: Cybersecurity Law Firm cyberattack

Managed IT for Law Firms: 4 Advantages vs Hiring an In-House IT Professional

Cybersecurity attacks continue to rise, and law firms of all sizes have become a prime target. According to Coveware, 24.9% of all ransomware attacks in Q1 2021 targeted professional services firms, especially small and midsize law firms. With the surge in cyberattacks, firms have begun to shift how their IT is managed, with an increase in the use of managed IT services versus in-house IT professionals.

Topics: IT Cybersecurity IT Best Practices Productivity cyberattack

The Time for DaaS is Right Now

At the onset of the pandemic, there was an immediate shift to remote work. More than 2 years later, this has morphed into widespread adoption of hybrid work environments. Not surprisingly, a recent report from Accenture found that the spike in remote work resulted in more growth of laptops and notebooks than desktops. But no matter what device they use, people must be able to work from home in the same way they can work in the office.

Topics: Boxtop Tabush Group Desktop as a Service (DaaS) remote access mobility cyberattack

Three Cybersecurity Best Practices for Your Firm

Proper education can help in preventing any of the cybersecurity attacks described in the 411 on Cybersecurity and Your Firm. While it is true that your IT department plays a vital role in ensuring your firm follows cybersecurity best practices, that does not mean they alone are responsible for your firm’s security. Awareness of and participation in cybersecurity best practices need to become part of your firm’s culture for every single person. Here are three things you can do.

Topics: IT Cybersecurity cyberattack

Annual Update 2022

2021 was another successful year of innovation and development at Tabush Group. Not only did we experience growth in 2021, we also spent the year focusing our efforts on improving client experience, updating our datacenter and security to the latest technology, and much more. Find out about these improvements and get a taste of what's ahead for 2022!

Topics: cloud IT Cybersecurity Boxtop Tabush Group Desktop as a Service (DaaS) mobility cyberattack

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

Topics: IT Cybersecurity cyberattack

What Is Social Engineering and How to Prepare Your Firm

Social engineering is the practice of exploiting human psychology and manipulating people to gain access to systems, data, or a physical location. This term might be newer, but the art of the scam has been around for much longer.

Topics: IT Cybersecurity Social Engineering cyberattack

Cybersecurity Tips: If You Get Caught Phishing, Prepare to Catch a Whopper!

Phishing remains one of the most common types of data breaches and often leads to a ransomware attack. When ransomware hits your IT, all or substantial parts of your IT will stop functioning and your data becomes compromised. The only way to bring your systems back online is to restore from backup or to “pay the piper,” the cybercriminal, their ransom. While ransoms of the past were in the thousands, they are now typically hundreds of thousands or even millions! In a worst-case scenario, there will be operating losses due to interruption of services when restoring and rebuilding your systems. The other main results of phishing are the stealing of personal or confidential business information, as well as the hijacking of a person’s mailbox, to deliver false instructions to illicit a payment to the cybercriminal.

Topics: Cybersecurity Law Firm Phishing cyberattack