Skip to the main content.
What Size Law Firm Are You?

We've crafted solutions tailored to your firm

Insurance Glossary

The world of insurance for law firms can be confusing, and difficult to navigate. We've created this glossary because these common insurance terms should be easy to understand.

← Blog Home

The Phishing is Better than Ever

2 min read

The Phishing is Better than Ever

Remember the good old days when it was pretty easy to recognize a phishing attack? Who couldn’t determine that an email asking for verification of one’s banking credentials was a fake after seeing that it was from the wrong bank? Those are so 2017. It’s different now. The phishers have upped their game and we all need to be ever more meticulous in our efforts to avoid becoming a victim of a phishing attack. Here is just one example of how these types of attacks are evolving.

Instead of simply sending out mass emails to individuals hoping to trick a few poor souls into verifying their login credentials to some account, cybercriminals are now starting to pretend to be a potential new client of, let’s say, a tax professional. The cybercriminals send email to a few tax professionals inquiring about his or her services. Once one of these tax professionals responds, a second email, which contains a malicious payload, will be sent back to the tax professional. If the tax professional takes the bait, the malicious payload will allow the cybercriminal to completely take over the tax professional’s computer giving complete access to the client contact database. This is where it gets interesting.

The cybercriminal now has the ability to send out very legitimate looking emails to all of the tax professional’s clients in order to try and obtain their financial records and that’s exactly what happens. Any client who responds will eventually learn that a fake tax return was filed in their name using the illegally obtained information. Trust me on this one, the subsequent headaches are just getting started.

So, what to do? Stay vigilant and, I’ll say it again, become ever more meticulous in your efforts to identify phishing attacks. For example, if an email is unexpected even though it appears to come from a known and trusted source, stop. Pick up the phone and call this person to make certain they actually sent it. Also, don’t trust that any phone number provided in the email is accurate. It may not be. Look it up yourself. If you must send tax or financial information via email, never hit reply and attach documents. Type out the correct email address on your own, triple verify that the address of the recipient is correct, and make sure you encrypt the attachments if not the entire email.

That said, if you ask me, it’s only a matter of time before the cybercriminals start pretending to be potential clients of lawyers, if they haven’t already. All I can say about this possibility is verify before you trust and make sure that all tech hardware and software is current in terms of patches and updates.

printfriendly-pdf-button-nobg-md-Nov-01-2022-08-44-54-4335-PM

 

Since 1998, Mark Bassingthwaighte, Esq. has been a Risk Manager with ALPS, an attorney’s professional liability insurance carrier. In his tenure with the company, Mr. Bassingthwaighte has conducted over 1200 law firm risk management assessment visits, presented over 600 continuing legal education seminars throughout the United States, and written extensively on risk management, ethics, and technology. Mr. Bassingthwaighte is a member of the State Bar of Montana as well as the American Bar Association where he currently sits on the ABA Center for Professional Responsibility’s Conference Planning Committee. He received his J.D. from Drake University Law School.

Don't Fall for the Trust Account Scam

2 min read

Don't Fall for the Trust Account Scam

The idea of the Nigerian e-mail scam in which the rich Prince finds himself needing a few thousand dollars from you so that he can obtain his...

Read More
Two Factor Authentication Isn’t the Panacea Many Think It Is

2 min read

Two Factor Authentication Isn’t the Panacea Many Think It Is

Let me be very clear, two factor authentication (2FA) is an essential security tool that everyone should be taking advantage of when and wherever...

Read More
Juice Jacking, What in the World???

1 min read

Juice Jacking, What in the World???

As with any cyber threat, prevention starts with awareness of the risk. As a road warrior, I see people taking a particular and absolutely...

Read More