Solicitors' duties in the digital era - is there a duty of technological competence?
Even without a formally recognised duty of technological competence, such a duty might be inferred by an Australian court having regard to reported levels of cybercrime, other professional duties and the official warnings by regulatory bodies.
Eight reasons why cyber threats are now a key risk for property practitioners
The choice between paying a ransom and either losing all your business records or seeing confidential client information lost or published is one that no practitioner ever wants to make.
Cyber extortion – legal and ethical considerations if you receive a ransom demand
The choice between paying a ransom and either losing all your business records or seeing confidential client information lost or published is one that no practitioner ever wants to make.
Home truths for all after ransomware attack hits celebrity law firm
A potentially costly ransomware attack on a major American law firm is a reminder for all firms to educate their employees about cyber risks at a time when more people are working during the COVID-19 crisis
Cyber risk for lawyers: a unique form of professional risk
Cybercrime is challenging organisations everywhere, with daily news stories about businesses, government organisations and even global IT companies that have been hacked. Law societies and insurers have been warning lawyers about cyber risk, in particular…
How cyber resilient is your law practice?
Our article by Simone featured in the Law Society Journal, December 2018. Click though to read the full article where Simone discusses the types of scams impacting legal practices, and how they actually work. She highlights possible dangers in outsourcing responsibility for cyber resilience to external IT consultants and, how do different insurance policies respond?
NotPetya – the most devastating cyberattack since the creation of the internet
The Untold Story of NotPetya, the Most Devastating Cyberattack in History contains a fascinating discussion. Read the full article by Andy Greenberg on Wired.com