|
Because business email compromise ("BEC") often relies on social engineering, people are as important as technology in preventing losses from BEC.
Usually, a cybercriminal uses stolen email credentials or a spoofed email address that looks like a trusted address. The goal is to trick an employee or a client into bypassing normal procedures, which can open the door to the cybercriminal stealing money or gaining access to valuable information and assets. The cybercriminal may attempt to misdirect electronic payments or steal sensitive data such as the personal information of law firm clients. Ransomware and extortion events can also result. With social engineering tactics, a thief does not have to use brute force to break into your system – they can circumvent your security by convincing someone to open a malicious link or attachment, give up a password, or approve access.
Join ALIA for a free webinar to learn how the Universal Cyber Coverage Program that you already have through ALIA, provided by Beazley Canada Limited (“Beazley”), can help you in the event of a cyber incident. The session will include presentations from Beazley, the insurer that provides ALIA’s cyber coverage as of July 1, 2024, and Aon, ALIA’s broker.
Subscribers are encouraged to share this invitation with their law firm administrators, IT managers, and Chief Information Security Officers.
|