• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Protect your data as Russia-Ukraine war increases cybersecurity risk

March 16, 2022

By Ron Slyker

As part of the ongoing Russia-Ukraine conflict, Russian cyberattacks have primarily targeted Ukrainian government and bank systems, but the attacks may spread to countries outside of Ukraine soon. The Cybersecurity and Infrastructure Agency (CISA) and the FBI have warned organizations to increase protection as a precaution in case these attacks begin to affect the United States.

Experts have reported known Russian cyber groups gathering information on U.S. infrastructure like electric and gas sites. While the FBI and CISA have received no warnings of direct threats to any Western countries, it is best to act now to protect your information.

What can you do to protect your business from global conflict?

  1. Take action. Experts believe that any Russian cyberattacks would be disruptive, rather than intended to steal data, but working with a trusted IT provider now is a smart move. You should assess your cybersecurity situation and be prepared for increased cybersecurity risk.
  2. Protect against malware. A form of data-wiping malware has recently had a resurgence in Ukraine, and it could be used in potential attacks on the U.S. as well. It may not be utilized by Russian cybercriminals, but any hacker could modify the strain for their own use. Prevent it from ever reaching your business by using strong passwords and using multi-factor authentication.
  3. Extend security to each endpoint. Most cyberattacks today are targeted for a specific endpoint. If even one endpoint is reached and malware or ransomware is successfully established, be it on an email, mobile phone, or computer, the entire network could be compromised. We recommend using a form of endpoint detection and response (EDR) that provides threat detection, spam filtering, and sandbox attachment scanning for every endpoint in order to protect it from potential threats.
  4. Keep digital assets safe. Global conflicts increase cybersecurity risk in part because they inspire people to take action, which can create openings for phishing campaigns. Far-ranging cyberattacks will often take down thousands of websites at once by attacking servers, or even take down entire sections of the internet. Firewalls and network security tools monitor internet activity for vulnerabilities like these before they are exploited. Ensuring software is up to date with security patches can also help protect against these attacks.
  5. Back up data. In the event that your business is affected by a cybersecurity attack, the best form of damage control is having backups of all business data that has been captured or destroyed. We recommend keeping multiple copies of important information and storing it in different cloud-based and physical locations to ensure you never lose your information. You should work with an IT provider to have an incident response plan that will get your business back to functioning normally.

Filed Under: Topics, Information security, Risk management, Technology, articles Tagged With: Information security, Technology, Risk management, cybersecurity

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Monthly Financial Review Checklist for a Law Office

Build a Fortress: A Strong Workplace Security Culture

Offering AI Upskilling as a Job Benefit: A Smart Move for Office Managers

How and When to Ask a Client for a Referral

What to Do If You’re the One Who’s Always Late

Your Career

What to Do If You’re the One Who’s Always Late

Big Changes: How to Navigate a Law Office Merger

Shifting Towards Alternative Fee Arrangements

Tick Those Unpleasant Tasks Off Your To-Do List

Oversharing: Can You Please Curb Your TMI?

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315