Cyber criminals fallow the money, and depending on the type of litigation, there is plenty of money to be found in the data repositories of a law firm. Take due notice and protect yourselves accordingly.
These results are not surprising. AV is still a valid layer in the IT security onion, but it is far from effective for most threats in today’s landscape.
This article describes a dream many IT Security professionals have had – positive response from awareness training. For the record, it does not have to be a dream. It can be reality. I have seen it happen, so do not give up. Just last evening, I was speaking at a gathering of business professionals and I received motivated, engaging and intelligent questions from smart people actively seeking to improve their IT security situations. End users and business leaders want to be trained and educated. Keep training and sharing.
Apple just released a significant bundle of patches across most of their product offerings including MacOS, iOS, and Safari, and many of these patches are security focused. Please take a moment to review your environment and patch accordingly.
Yet another reason why you should use separate credentials for all online accounts and websites…