The Bulletin - Law Society of South Australia - September 2020

Page 28

RISK WATCH

Cybersecurity – a matter of when, not if MERCEDES EYERS-WHITE, PII RISK MANAGEMENT CO-ORDINATOR

I

t feels good to see progress. Plodding along in our day-to-day, it’s easy to miss the little gains. These days there are loads of tools out there to measure our progress and track our improvements. If you are a runner, a swimmer or a cyclist, chances are you use a GPS-enabled device to do just that. You let it track where you’ve been and when, at what speed and with whom. That information could be a bit sensitive, and if like me you’ve been using a Garmin device, you might be wondering just who now has access to that information after the ransomware attack on that company on 23 July. As I write the servers are just now beginning to restore after nearly five days out of action. While Garmin has no indication that any customer data has been accessed, lost or stolen, such an attack serves to remind us that even substantial tech companies with their resources and technical knowledge and IT departments are vulnerable. The disruption to the business is enormous, the remediation task prodigious and the tarnish to reputation enduring. Law firms are also valuable targets for criminals because they are obvious repositories of sensitive client and transactional information. The high profile attack in May, 2020 of US entertainment firm Grubman Shire Meiselas & Sacks points to a worrying trend in ransomware attacks. Aside from the eye-watering $42m ransom demand to unlock the law firm’s systems, nearly a terabyte of sensitive information is reported to have been stolen and threatened to be released publicly. Gone are the days, it would seem, when the ransom was moderate compared to the remediation exercise and the information was merely encrypted rather than stolen. Restoration of systems upon the payment

28 THE BULLETIN September 2020

of the ransom is no longer de rigueur either, and this trending lack of honour amongst thieves has prompted the Australian Cyber Security Centre to recommend ransoms are not paid, though they are still often the most economical solution. It’s not just large firms, either. Indeed, smaller firms are attacked more often than you would think because hackers, like most people, go for low-hanging fruit. They figure small firms have fewer resources, less technical knowledge internally and less time to pay attention to these things. And generally, they’d be right, which means your risk is higher than you may have thought. Failure to take appropriate steps to protect and impose proper cyber security practices includes a risk of breaching your professional obligations as a legal practitioner in South Australia (under the Australian Solicitors’ Conduct Rules). Unfortunately, this is more a matter of ‘when’ than ‘if ’. If your system was locked by a ransomware attack today, what would you do? Do you have a plan? Do you have an up-to-date back-up of your critical information available to you? Cyber-security has been a hot topic for some time now, so if you have put it in the ‘later’ pile, the time for action is now. So, what can you do? In short, you need to stop being low hanging fruit. To assist you in this, in addition to the resources and information already provided on our website, the Society’s Risk Management section has licensed and adapted several useful cyber tools and checklists from the Queensland PII insurer Lexon. We also recommend engaging with your IT service provider – there is a checklist to help you have a meaningful discussion about your needs. To get you started, insured practitioners can access the following on the Law Society website (www.lawsocietysa.asn.au):

• 8 Steps to enhance your cybersecurity while working remotely Working from home increases the cyber risks to a legal practice; consider these eight steps to better protect yourself, your family and your practice. • Cyber Off-Risk Email Conducting basic checks on an unsolicited email purporting to be from a potential new client can leave you in doubt of its legitimacy; consider using this email template to prompt voice communications instead. • Cyber Alert – Funds transfer critical information An information sheet for clients, insureds and all known transfer parties on procedures for the transfer of funds, including reading out and reading back account and BSB numbers. • Cyber bookmark Cut it out and keep it by your screen; a bookmark-sized reminder on simple cybersecurity steps for all staff. • Cyber Security 101 Defending your assets in cyberspace is about more than just the device you’re using; do you know the four layers of a computing system? • Key System Controls Many steps can be undertaken to limit a cyber criminal’s ability to adversely use your systems. These are some core components. • Cyber Security – IT Systems Checklist Use this checklist to inform a meaningful discussion with your IT service provider. • Where to Deploy MFA Multi-factor authentication is one of the most powerful things you can do to limit the risk of an Account Takeover attack – but there is no point locking the front door if the back door is wide open…


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Gazing in the Gazette

7min
pages 36-37

Family Law Case Notes By Rob Glade-Wright

5min
page 35

Wellbeing & Resilience: Three little words can make a world of difference By Zoe Lewis

4min
pages 38-40

Hang Jean Lee - By Dr Auke ‘JJ’ Steensma

24min
pages 30-34

Members on the Move

2min
page 29

Prohibiting impersonation of police in an era of Deepfakes? By Tania Leiman & Anthony Stoks

10min
pages 23-25

Risk Watch: Cybersecurity – a matter of when, not if - By Mercedes Eyers-White

4min
page 28

Tax Files: The definition of a discretionary trust under the Land Tax Act - By Bernie Walrut

10min
pages 26-27

Major reform of SA’s succession laws By The Hon Vickie Chapman MP

3min
page 22

Sexual harassment in the workplace: Make it your business to make sure it’s not in your business - By Marissa Mackie & Leah Marrone

7min
pages 20-21

New surrogacy laws move towards national uniformity - By Julie Redman & Matilda Redman-Lloyd

8min
pages 16-17

The SA Country Fire Service: Protecting life, property and the environment - By Margaret Kaukas

4min
pages 18-19

The push to give first responders PTSD protection in workers compensation laws

4min
pages 12-13

Emergency management plans and the laws that underpin them By Sally Connell

8min
pages 14-15

Pro bono legal assistance for fire victims

4min
pages 6-7

From the Editor

3min
page 4

Scars run deep: the healing process in the aftermath of the bushfire disaster

14min
pages 8-11

President's Message

4min
page 5
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.