Practical guidance for managing cyber risk
Managing cyber risk is now an integral part of legal practice, and law firms should consider both risk management and risk transfer via insurance when planning cyber risk response.
Transitioning to e-conveyancing
From 1 July 2018, all caveats and land transfers without mortgages in NSW have been lodged electronically, and this will be extended to all mainstream property transactions from 1 July 2019.
How cyber resilient is your law practice?
Our article by Simone featured in the Law Society Journal, December 2018. Click though to read the full article where Simone discusses the types of scams impacting legal practices, and how they actually work. She highlights possible dangers in outsourcing responsibility for cyber resilience to external IT consultants and, how do different insurance policies respond?
Privacy compliance
Further information is contained in the linked article, written in 2017 for Lawcover’s risk page in the Law Society Journal under the title ‘Is your firm privacy compliant?’.
Risk transfer through insurance
Insights: Regardless of size, cyber risk is a significant risk to all law firms. Professional indemnity policies often provide broad coverage for third party claims but not the firm’s own losses. Cyber insurance can offer different, additional types of cover including specialist technical support.
Email scams are targeting law practices
This article was first published in the Law Society Journal of May 2018. Key insights: beware of increasingly prevalent email scams, especially those requesting passwords, be vigilant in updating computer security software, be wary of fraudulent emails requiring changes to payment directions.
Cyber Security for lawyers
Podcast: Panel discussion on Cyber Security for lawyers, featuring Simone as one of the panellists.
NotPetya – the most devastating cyberattack since the creation of the internet
The Untold Story of NotPetya, the Most Devastating Cyberattack in History contains a fascinating discussion. Read the full article by Andy Greenberg on Wired.com