A-Z of Cyber Threats (for staff)
Cyber Threats
Threat | What is it? | Defensive measures |
Botnet | Collection of infected computers remotely controlled by a hacker. The hacker can share or sell access to the computers to other cybercriminals to be used to distribute spam or overload a system. | See Malware and Hacking |
Chain letters | An email that encourages the user to forward copies to other people. Not a security threat but can waste time and slow down mail servers. | Ensure users know not to forward chain letters or hoaxes. We try to stay informed about chain letters and hoaxes. |
Commercial identity theft | Bogus firms are essentially committing commercial identity theft. They present a significant risk to the interests of consumers and our reputation if we become associated with one, e.g., because it uses our name. Can pose risks to our clients too, who may be tricked into sharing information or paying over money. Often, the perpetrators use data from law firms themselves to make their activities look more | Try not to give over too much information about the firm and your activities. Monitor mentions of your firm's name online to detect fraudulent activity. Dispose of firm data securely, e.g., by shredding. |
Cookie |