Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption. In 2012, the American Bar Association approved a number of changes to the Model Rules of Professional Conduct. Of particular interest is the comment to Model Rule 1.1: To maintain the requisite knowle [...]
In recent briefings, we have reported on Internet criminals’ behavior with regards to researching their victims’ professional profiles and associations (using LinkedIn recruiter tools, for example) and using these social cues to lure unsuspecting victims into sending money to imposter accounts. Even if you have not been targeted in this way, if you use o [...]
Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization. Here’s how BEC attacks often play out for several reference industries: Law Firms and their Clients An email purporting t [...]
On Sunday, more than a hundred media outlets around the world, coordinated by the Washington, DC-based International Consortium of Investigative Journalists (“ICIJ”), released stories on the “Panama Papers”, which is an exposé of private client and internal work product emails and other files. More than 5 million emails and files were stolen from within the IT systems of the exclusive Panamanian law firm Mossack Fonseca. World leaders and U.S. business people have become targets as a [...]
In a society that embraces online shopping, GPS location tracking, mobile texting and email anytime and anywhere, it is no wonder that technology’s promise of convenience continues to overrule many peoples’ instincts to protect and secure their private information. The preference for convenience over security is present even at the highest levels of the US Government. With the news earlier this year about former Secretary of State [...]
The RPost team thanks you, our community of users, customers, partners, shareholders, and advocates, for another exciting year at RPost. Your support enables the RPost team to continue innovating for our customers, and to maintain RPost as the global standard for secure and certified electronic communications. We believe the investments we have made over the course of the year will continue to advance the experience and maximize value for our users and partners in 2016 and beyond. Here are so [...]
According to a study by Cybersecurity firm Mandient, 80 of the largest 100 law firms in the United States have been hacked over the last several years. For many lawyers, this is old news; it’s assumed that IT staff has already done everything it can to address any possible security vulnerabilities. However, increased hacker sophistication has brought the emergence of new risks. Hackers are now targeting individuals, exploiting potential weaknesses such as pla [...]
Texas State Bar has partnered with RPost to educate attorney members on how, when, and why to use RMail® services to track opening, record certified e-delivery proof, encrypt for client privacy, and send declarations for eSignoff. Powered by RPost’s Registered Email technology, RMail has been very popular among legal service professionals. Recently, more than 100 Florida-based law firms ins [...]
Openwave Messaging has elected to embed RMail® into the email user interface for 400 million end users who access email through their local telecommunications operator or ISP. This is the first time secure email encryption has been deployed in the market on such a grand scale. RMail® is powered by RPost’s patented Registered Email technology. [...]
Robert Bond, one of the world’s premier legal experts in data privacy and information security, just hosted an exclusive webinar where he presented a number of practical reasons why every legal professional needs to do more than just use standard Microsoft Outlook or other basic technologies when corresponding with clients, other legal counsel, the courts and other parties. Mr. Bond, Partner and Head of Data Protection & Information Security at Speechly Bircham LLP based [...]
February 03, 2023
January 27, 2023
January 20, 2023
January 13, 2023
January 06, 2023