A-Z of cyberthreats—for staff
A-Z of cyberthreats—for staff

The following Practice Compliance guidance note provides comprehensive and up to date legal information covering:

  • A-Z of cyberthreats—for staff

Threat What is it? Our defensive measures
Botnet Collection of infected computers remotely controlled by a hacker.
The hacker can share or sell access to the computers to other cybercriminals to be used to distribute spam or overload a system.
See Malware and Hacking
Chain letters An email that encourages the user to forward copies to other people.
Not a security threat but can waste time and slow down mail servers.
Our ensures users know not to forward chain letters or hoaxes.
We try to stay informed about chain letters and hoaxes.
Commercial identity theft Bogus firms are essentially committing commercial identity theft.
They present a significant risk to the interests of consumers and our reputation if we become associated with one, eg because it uses our name.
Can pose risks to our clients too, who may be tricked into sharing information or paying over money.
Often, the perpetrators use data from law firms themselves to make their activities look more genuine.
We try