“Unfortunately, while organisations are developing new security mechanisms, cyber criminals are cultivating new techniques to circumvent them.”
Online security changes as quickly as the weather. New threats emerge all of the time, so it pays to be aware, and to know what to look out for. It is important to be ready for security breaches, and have system in place to adapt to them.
Through our Intelligence Centre, we will try and keep you posted on the biggest threats facing your IT system right now, and if needed, we can offer IT support and security systems to keep your data safe from harm.
The Biggest Threats to Your Online Security
The biggest threats to your online security in 2015 can be divided into 3 categories:
“Not all clouds are built alike; some are more vulnerable than others”
Cloud computing has opened us all up to a greater level of threat, as made very public in recent high profile data breaches. For your Chambers, our cloud computing systems offer access to a level of protection that would usually be out of the reach of many smaller organisations.
Bring Your Own Device to Work (BYOD)
As it becomes a common trend for employees to bring their own mobile devices to work, the threat of external manipulation of software vulnerabilities is greatly increased.
Cyber space is now the preferred stomping ground for criminals and terrorists looking to make money or steal valuable files, data and information.
LATEST THREAT: Suspicious Microsoft Office Files
Microsoft recently released a warning about suspicious, specially crafted malware Microsoft files, which can give an attacker the same access rights as the person that open it. It is a vulnerability in all supported version of Microsoft Office dating back to 2003.
“Antivirus applications won’t catch this attack when you download the files because the malware is inside an already trusted file type”
The Microsoft Security TechCenter have reported that it is mainly Powerpoint files that have been affected so far, but are urging users to be aware that any Microsoft Office file could be used to carry the malware.
As with all IT security, you should be wary of any files you are unsure of and avoid downloading Microsoft Office files from strange websites. Make sure they are from a source you can trust and err on the side of caution. Microsoft has also suggested enabling User Account Control to reduce the risk of an attack. With this protection, a prompt is issued before The Object Linking and Embedding (OLE) malware can take effect.
We know that barristers and clerks frequently use Microsoft Office files, so we urge you to be vigilant. Until Microsoft can fix the problem, exercise caution so that your Chambers’ sensitive and confidential files are kept secure.
To find out more about how vulnerable you might be, read the full Microsoft Security Advisory, here.