{"id":750,"date":"2020-02-02T12:35:14","date_gmt":"2020-02-02T12:35:14","guid":{"rendered":"https:\/\/techlaw.co.il\/en\/?p=750"},"modified":"2020-02-02T12:47:07","modified_gmt":"2020-02-02T12:47:07","slug":"the-traps-of-technology-in-law","status":"publish","type":"post","link":"https:\/\/techlaw.co.il\/en\/the-traps-of-technology-in-law\/","title":{"rendered":"The traps of technology in law"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"750\" class=\"elementor elementor-750 elementor-bc-flex-widget\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73f323a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73f323a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-432b7ba\" data-id=\"432b7ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a81aa elementor-author-box--layout-image-left elementor-author-box--align-left elementor-widget elementor-widget-author-box\" data-id=\"c6a81aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/techlaw.co.il\/en\/wp-content\/uploads\/2018\/09\/02.png\" alt=\"Picture of Zohar Fisher\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tZohar Fisher\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Founder at Robus Legal Marketing Co-Founder at LawFlex Founder at Tech&Law \u2013 Israel\u2019s 1st LegalTech platform Israel<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-316be28 elementor-widget elementor-widget-text-editor\" data-id=\"316be28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #000000;\">The world of law is governed by trust, confidentiality and secrecy. With modernization and the increasingly digital world, sensitive documents and a lot of confidential information are stored online and transmitted over the internet \u2013 in a full plate for cybercriminals.<\/span><\/strong><\/p><p><span style=\"color: #000000;\">Cyber \u200b\u200bsecurity in law firms is increasingly essential nowadays. In general, studies and notes from lawyers who usually work in operations involving a lot of money or companies listed on the stock exchange, contain exclusive and confidential information. If an unauthorized person has access to these documents, it is possible to make changes and or obtain a lot of money illicitly.<\/span><\/p><p><span style=\"color: #000000;\">And it\u2019s simple. Really simple. In 2016, a law firm in the Philippines was attacked by a virus that simply arrived there via an email with an attachment containing a malware.<\/span><\/p><p><span style=\"color: #000000;\">Cisco&#8217;s 2015 Annual Security Report ranked law firms as number seven on its list of the most vulnerable business sectors, commonly targeted by hackers, and this was the first time that the legal field appeared in the top 10. This is explained by the fact that it is much easier to obtain information from large companies breaking into law firm servers than to go through the corporations&#8217; solid technological security infrastructures. Going a step further, it is the law firm that provides services to these companies and that stores and concentrates their most sensitive information.<\/span><\/p><p><span style=\"color: #000000;\">Another case took place in Spain, in which the Araoz &amp; Rueda office informed its customers that the company&#8217;s internal data had been compromised due to an attack on its database. Altogether, according to information from El Pa\u00eds, there are over 400 daily attacks monitored by security agencies across Spain: &#8220;We ask that if in the next few days you receive a suspicious message from our office, whether due to the content or the sender, do not click on any hyperlink and inform us as soon as possible,&#8221; said the office&#8217;s statement.<\/span><\/p><p><span style=\"color: #000000;\">The New York Times of February 23 2019 brought information that the famous American law firms have held secret meetings to deal with hacker attacks. Law firms are a real depository of confidential information about their clients, including international business transactions and legal wiretaps obtained for legal defense in court, etc. All this if it falls into the hands of criminals can end an operation in progress and cause incalculable damage, because in addition to economic damage there is moral damage and the image of the office.<\/span><\/p><p><span style=\"color: #000000;\">An office that leaks confidential information loses its credibility right away, its name gets badly spoken and the way customers and the market sees them changes completely. That is why it is <strong>crucial<\/strong> to pay extra attention to the care of storing and transmitting information over the internet. Currently, any message can be accompanied by a virus. In addition to a good cybersecurity system, all office staff must be well informed about messages and attachments, that is, in addition to security, there must be detailed training to prevent the invasion of files or their loss<\/span><\/p><p><span style=\"color: #000000;\">There are some ways to deal with digital security in a healthier way, including:<\/span><\/p><ul><li><span style=\"color: #000000;\"><strong>More frequent backups and cloud storage<\/strong>: This way the loss of important documents is avoided and all crucial records for the office are saved.<\/span><\/li><li><span style=\"color: #000000;\"><strong>More powerful Antivirus<\/strong>: A good and complete antivirus and firewall is essential on all office systems.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Investments in software and IT<\/strong>: You can&#8217;t save money when it comes to digital security, keeping information secure and confidential should be standard.<strong>\u00a0<\/strong><\/span><\/li><li><span style=\"color: #000000;\"><strong>Encryption<\/strong>: Encrypting documents is also essential to protect important files with a password. This way, only the user has access, reinforcing the cyber security and privacy of the data of your company and others involved in the process.<\/span><\/li><\/ul><p><span style=\"color: #000000;\">Nowadays it is very easy for anyone to learn how to break into computers and servers, all the information you need to carry out an attack can be easily found on the internet or on the deep web, turning anyone into a potential criminal if someone understands more about technology and programming gets even easier.<\/span><\/p><p><span style=\"color: #000000;\">In this way, it is crucial to adopt methods to protect against cyber attacks and to keep the office&#8217;s digital information and documents safe, times are different and the measures taken must be updated.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The world of law is governed by trust, confidentiality and secrecy. With modernization and the increasingly digital world, sensitive documents and a lot of confidential information are stored online and transmitted over the internet \u2013 in a full plate for cybercriminals. Cyber \u200b\u200bsecurity in law firms is increasingly essential nowadays. In general, studies and notes [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[19,14],"class_list":["post-750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-proffesional-articals","tag-israeli-legal-tech","tag-legaltech"],"_links":{"self":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/comments?post=750"}],"version-history":[{"count":5,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/750\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/750\/revisions\/760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/media\/758"}],"wp:attachment":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/media?parent=750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/categories?post=750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/tags?post=750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}