Skip to the main content.
What Size Law Firm Are You?

We've crafted solutions tailored to your firm

Insurance Glossary

The world of insurance for law firms can be confusing, and difficult to navigate. We've created this glossary because these common insurance terms should be easy to understand.

← Blog Home

Holidays and Weekends: Prime Time for Cyberattacks

3 min read

Holidays and Weekends: Prime Time for Cyberattacks

Did Your Law Firm Survive Thanksgiving?

We’re happy to say that our company survived – but we were attacked over 400 times between shutting the office down on Wednesday evening and Thursday morning. All of the attacks originated from Microsoft IP addresses (are you addressing this Microsoft?).

Did we get a good night’s sleep that Wednesday? Sure. Good preparation for attacks means that, if the attack is unsuccessful, you don’t get alerts. We learned of all the attacks first thing Thanksgiving morning, with a full report to review over our morning coffee.

Don’t think we’re cocky about “winning” the battle. No one is immune from cyberattacks, no matter how good their defenses are. We regard it as being both well-prepared — and lucky.

But it did occur to us, with Christmas and New Year’s on the way, that it was time to underscore to law firms something that should be obvious: Cybercriminals don’t go on holiday!

Shore Up Your Law Firm Defenses: Scary Stats

The week before Thanksgiving, cybersecurity firm Cybereason published the results of its recent survey. Understandably, more than a third of respondents reported that it took longer for their organization to assess, stop and recover from a cyberattack on a holiday or weekend attack as opposed to a weekday. The larger the organization, the longer the delay.

They also lose more money because of those attacks, which are primarily ransomware attacks. The root of the problem is that so many victims are understaffed on weekends and holidays. Half of the respondents reported being staffed at levels below 33%. 20% of companies cut security staffing by 90% from normal weekday levels.

This gives attacks more time to avoid detection, do more damage, and exfiltrate more data as these understaffed security teams scramble to respond.

Cyber Pros Buckle Up, Worried About a Visit from The Grinch

It has now been a lot of years that cyber pros have been battling holiday-related attacks, so most of them are on edge – and lacking the power to demand that staffing be maintained at normal or close to normal levels.

When Santa comes this year, all these experts know that hackers will not be far behind. History is our guide: From the Aurora attacks on Google in 2009 to the more recent Log4J and SolarWinds attacks, the notable fact is that these attacks took place mostly between Thanksgiving and New Year’s Day.

No cyber pro worth their salt assumes they will be home for the holidays.

A Gift of Ransomware for the Holidays?

Yeah, not much of a gift, but once that seems to be ever-increasing. In 2021 there was a 70% increase in ransomware attacks in November and December compared to January and February.

So, what is a law firm to do? The best advice these days comes from the Cybersecurity and Infrastructure Security Agency (CISA), part of the Department of Homeland Security. Its advice, well worth taking, has been updated for 2022.

Here are, verbatim, some of the tips that are integral to preventing and fighting weekend and holiday attacks. Law firm management should make sure all of these steps are in place.

“Understand the IT environment’s routine activity and architecture by establishing a baseline. By implementing a behavior-based analytics approach, an organization can better assess user, endpoint, and network activity patterns. This approach can help an organization remain alert on deviations from normal activity and detect anomalies. Understanding when users log in to the network—and from what location—can assist in identifying anomalies. Understanding the baseline environment—including the normal internal and external traffic—can also help in detecting anomalies. Suspicious traffic patterns are usually the first indicators of a network incident but cannot be detected without establishing a baseline for the corporate network.

  • Review data logs. Understand what standard performance looks like in comparison to suspicious or anomalous activity. Things to look for include:
    • Numerous failed file modifications,
    • Increased CPU and disk activity,
    • Inability to access certain files, and
    • Unusual network communications.
  • Employ intrusion prevention systems and automated security alerting systems—such as security information event management software, intrusion detection systems, and endpoint detection and response.
  • Deploy honeytokens and alert on their usage to detect lateral movement.

Indicators of suspicious activity that threat hunters should look for include:

  • Unusual inbound and outbound network traffic,
  • Compromise of administrator privileges or escalation of the permissions on an account,
  • Theft of login and password credentials,
  • Substantial increase in database read volume,
  • Geographical irregularities in access and login patterns,
  • Attempted user activity during anomalous logon times,
  • Attempts to access folders on a server that are not linked to the HTML within the pages of the web server, and
  • Baseline deviations in the type of outbound encrypted traffic since advanced persistent threat actors frequently encrypt exfiltration.”

Final (Altered) Words from The Grinch Whole Stole Christmas

I must stop Christmas from coming... but how? He puzzled and puzzled 'till his puzzler was sore. Ransomware, that’s how!

Sharon D. Nelson, Esq., is the President of Sensei Enterprises, Inc., a digital forensics, cybersecurity and information technology firm in Fairfax, Virginia. Ms. Nelson is the author of the noted electronic evidence blog, Ride the Lightning and is a co-host of the Legal Talk Network podcast series called “The Digital Edge: Lawyers and Technology” as well as “Digital Detectives.” She is a frequent author (eighteen books published by the ABA and hundreds of articles) and speaker on legal technology, cybersecurity and electronic evidence topics. She was the President of the Virginia State Bar June 2013 – June 2014 and a past President of the Fairfax Law Foundation and the Fairfax Bar Association. She may be reached at snelson@senseient.com

Ethics: Protect Your Electronic Contact List from Prying Eyes

3 min read

Ethics: Protect Your Electronic Contact List from Prying Eyes

Introduction to an Ethical Problem Most Attorneys Don’t Know About In April of 2022, a headline caught our attention. It referenced a new legal...

Read More
Law Firms Cringe, But Bow to the Need for Zero Trust Architecture

Law Firms Cringe, But Bow to the Need for Zero Trust Architecture

Zero Trust Architecture simplified Lawyers have a “deer in the headlights” look whenever we talk about Zero Trust Architecture (ZTA) - and we do...

Read More
What Do Women Lawyers Really Want?

4 min read

What Do Women Lawyers Really Want?

Why We Wrote This Article The President of Sensei Enterprises, co-author Sharon Nelson, is a woman. She is involved with multiple groups and...

Read More