{"id":692,"date":"2019-08-28T10:45:53","date_gmt":"2019-08-28T14:45:53","guid":{"rendered":"http:\/\/blogs.duanemorris.com\/techlaw\/?p=692"},"modified":"2019-08-28T10:54:29","modified_gmt":"2019-08-28T14:54:29","slug":"staying-ahead-of-rampant-cyber-attacks","status":"publish","type":"post","link":"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/08\/28\/staying-ahead-of-rampant-cyber-attacks\/","title":{"rendered":"Staying Ahead of Rampant Cyber-Attacks"},"content":{"rendered":"<p>Since the advent of the most rudimentary\u00a0technology, criminal activity has followed. And in more recent times, the internet certainly has been no stranger to criminal enterprises. Indeed, governmental\u00a0entities, companies and\u00a0individuals are falling victim to all sorts of cyber-crimes on a constant basis. A look at just one criminal target\u00a0drives home the rampant nature of online attacks.<\/p>\n<p>Brace yourself for this &#8211; the\u00a0City of London\u00a0Corporation suffered\u00a0<i>almost one million cyber-attacks\u00a0monthly\u00a0<\/i>for the first quarter of 2019, based on\u00a0information obtained by Centrify as reported by\u00a0info\u00a0security-magazine.com. That indisputably is a\u00a0phenomenal number of attacks on the local authority which oversees capital housing for a good portion of the financial center in London.<!--more--><\/p>\n<p>In total, the City of London Corporation endured practically 2.8 million attacks during the subject time period, averaging 927,000 per month. And the\u00a0trend is troubling, as this represents a 90% increase from the\u00a0preceding quarter,\u00a0last quarter of 2018.<\/p>\n<p>The largest category of attacks were classified as spam, which can be burdensome, but\u00a0fortunately, often\u00a0may not result in significant damage or harm.<\/p>\n<p>The second largest category was attributed to &#8220;spoof mail,&#8221;\u00a0likely relating to phishing efforts.<\/p>\n<p>There were also a large number attacks\u00a0referred to as &#8220;top malware.&#8221;<\/p>\n<p>On the one hand, the sheer number of attacks is of concern,\u00a0especially the sharp upward trend. On the other hand, it is positive that at least the attacks are being detected.<\/p>\n<p>Nevertheless, the City of London Corporation\u00a0houses sensitive information within its systems and databases, and like other government entities and\u00a0companies maintaining sensitive information, is a\u00a0target by cyber-criminals. While phishing and malware at first blush might not sound so troubling\u00a0at first blush because they do not necessarily get the headlines like a distributed denial of service attack that shuts down a web site, the mass scale of such attacks can result in\u00a0significant collective harm.<\/p>\n<p>The challenge is to stay ahead of cyber-criminals by putting security and\u00a0detection technology measures in place and to keep updating those\u00a0measures as cyber-criminals continue to become more\u00a0sophisticated and adept in the criminal practices.<\/p>\n<p><i><a href=\"https:\/\/www.duanemorris.com\/attorneys\/ericjsinrod.html\">Eric Sinrod<\/a>\u00a0<a href=\"https:\/\/twitter.com\/ericsinrod\">(@EricSinrod on Twitter<\/a>) is a partner in the San Francisco office of Duane Morris LLP, where he focuses on litigation matters of various types, including information technology and intellectual property disputes. You can read his professional biography here. To receive a weekly email link to Mr. Sinrod&#8217;s columns, please email him at\u00a0<a href=\"mailto:ejsinrod@duanemorris.com\">ejsinrod@duanemorris.com<\/a><\/i>\u00a0<i>with Subscribe in the Subject line. This column is prepared and published for informational purposes only and should not be construed as legal advice. The views expressed in this column are those of the author and do not necessarily reflect the views of the author&#8217;s law firm or its individual partners.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the advent of the most rudimentary\u00a0technology, criminal activity has followed. And in more recent times, the internet certainly has been no stranger to criminal enterprises. Indeed, governmental\u00a0entities, companies and\u00a0individuals are falling victim to all sorts of cyber-crimes on a constant basis. A look at just one criminal target\u00a0drives home the rampant nature of online &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/08\/28\/staying-ahead-of-rampant-cyber-attacks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Staying Ahead of Rampant Cyber-Attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":54,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[47,199,197,502,528,13],"ppma_author":[876],"class_list":["post-692","post","type-post","status-publish","format-standard","hentry","category-infotechtelecom","tag-cyber","tag-cyberattack","tag-cybersecurity","tag-eric-sinrod","tag-tech-law","tag-technology"],"authors":[{"term_id":876,"user_id":54,"is_guest":0,"slug":"ejsinrod","display_name":"Eric J. Sinrod","avatar_url":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-content\/uploads\/sites\/17\/2014\/08\/sinroderic-125x150.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":0,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/692\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/media?parent=692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/categories?post=692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/tags?post=692"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/ppma_author?post=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}