October 4, 2017
On October 1, 2017, on the heels of the huge Equifax security breach, The Dispatch printed a story about a common e-mail scam that resulted in a $216,000 loss to a local couple after the sale of their residence.
Barron Henley of Affinity Consulting Group was asked for his input to help lawyers and law firms avoid making a similar mistake. Aside from carefully reading the e-mail address to verify accuracy, followed by making personal contact with the actual client/ostensible sender to verify content, his recommendations are:
"With regard to the use of a public wireless connection, the Committee believes that, due to the lack of security features provided in most public wireless access locations, Attorney risks violating his duties of confidentiality and competence in using the wireless connection at the coffee shop to work on Client's matter unless he takes appropriate precautions, such as using a combination of file encryption, encryption of wireless transmissions and a personal firewall. Depending on the sensitivity of the matter, Attorney may need to avoid using the public wireless connection entirely or notify Client of possible risks attendant to his use of the public wireless connection, including potential disclosure of confidential information and possible waiver of attorney-client privilege or work product protections, and seek her informed consent to do so."
"Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. 2FA can be contrasted with single-factor authentication (SFA), a security process in which the user provides only one factor -- typically a password.
Two-factor authentication provides an additional layer of security and makes it harder for attackers to gain access to a person's devices and online accounts, because knowing the victim's password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online services are increasingly introducing 2FA to prevent their users' data from being accessed by hackers who have stolen a password database or used phishing campaigns to obtain users' passwords.
The ways in which someone can be authenticated usually fall into three categories known as the factors of authentication, which include:
Technology competence is the subject of this year's Chester Professionalism Institute. Get practical tech tips that you can put to use in your daily practice.
6.0 CLE Hours, $175
Lunch and reception included