Imposter Fraud

Imposter fraud is perhaps the most common type of scam encountered by lawyers. As the FTC warns, it comes in many forms. Scammers pretend to be computer technicians, IRS officials, your banker, a client, or a law firm vendor. They may even pretend to be you!

No matter the method, the goal is always the same: to use social engineering to manipulate you into sending money. Here are nine tips from Webroot on how to avoid falling prey to phishing, vishing, and SMShing scams:

  1. Slow down. Spammers want you to act first and think later. If the message conveys a sense of urgency or uses high-pressure sales tactics be skeptical; never let their urgency influence your careful review.
  2. Research the facts. Be suspicious of any unsolicited messages. If the email looks like it is from a company you use, do your own research. Use a search engine to go to the real company’s site, or a phone directory to find their phone number.
  3. Don’t let a link be in control of where you land. Stay in control by finding the website yourself using a search engine to be sure you land where you intend to land. Hovering over links in email will show the actual URL at the bottom, but a good fake can still steer you wrong.
  4. Email hijacking is rampant. Hackers, spammers, and social engineers taking over control of people’s email accounts (and other communication accounts) has become rampant. Once they control an email account, they prey on the trust of the person’s contacts. Even when the sender appears to be someone you know, if you aren’t expecting an email with a link or attachment check with your friend before opening links or downloading.
  5. Beware of any download. If you don’t know the sender personally AND expect a file from them, downloading anything is a mistake.
  6. Foreign offers are fake. If you receive an email from a foreign lottery or sweepstakes, money from an unknown relative, or requests to transfer funds from a foreign country for a share of the money it is guaranteed to be a scam.
  7. Delete any request for financial information or passwords. If you get asked to reply to a message with personal information, it’s a scam.
  8. Reject requests for help or offers of help. Legitimate companies and organizations do not contact you to provide help. If you did not specifically request assistance from the sender, consider any offer to ’help’ restore credit scores, refinance a home, answer your question, etc., a scam. Similarly, if you receive a request for help from a charity or organization that you do not have a relationship with, delete it. To give, seek out reputable charitable organizations on your own to avoid falling for a scam.
  9. Secure your computing devices. Install anti-virus software, firewalls, email filters and keep these up-to-date. Set your operating system to automatically update, and if your smartphone doesn’t automatically update, manually update it whenever you receive a notice to do so.  Use an anti-phishing tool offered by your web browser or third party to alert you to risks.

All Rights Reserved 2019 Beverly Michaelis

 

 

Revisiting eFiling Tips

Are you an eFiling expert? Even so, it never hurts to refresh your memory on the
“best of” eFiling tips. Here are some from our friends at Smokeball, purveyors of law practice management software:

Use a separate and distinct eFiling email address
This ensures that important court notices won’t get buried in your unread work or personal messages.

Check your spam and junk email folders
Court mail lands here more often than you might think.

Whitelist important senders
While not full proof, this step at least offers some assurance that messages are more likely to make it to your inbox. Learn more here.

Check the online court docket
This is a simple and effective way to verify that you’ve captured important court deadlines in your calendar.

Don’t wait until the last-minute
Last-minute filings are more likely to go wrong than right. Give yourself a cushion of time to do the job right – and recover from any mistakes.

Sound familiar? I’ve made these same points many times here, in CLEs, and elsewhere. See Nuts and Bolts of Oregon eCourt and Zero Tolerance for e-Filing Error.

Are you an eFiling novice?

If so, check out the “Oregon eFiling Checklist for First Time eFiler,” on the Professional Liability Fund website. From the homepage, select Practice Management > Forms > eCourt. For a thorough overview of eCourt malpractice traps, see my 2017 CLE.

The case for Oregon eService

Read the October issue of the Oregon State Bar Bulletin featuring “The Case for Oregon eService: An Underused Asset.” If you missed the Oregon eService CLE earlier this year, consider ordering the video or audio recording. Answers to frequently asked questions may be found here.

All Rights Reserved – 2018 – Beverly Michaelis

Failure to Check Spam Folder Leads to Missed Deadline

Court notices delivered via email are a known point of vulnerability for law firms: failure to timely check messages, accidental deletion of court notices, or haphazard review of spam folders.

Now The Researching Paralegal reports on the latest variation of this theme.

A trial court clerk in Florida served an order by email awarding a significant amount of attorney fees to the prevailing party (appellee).  The opponent/appellant claimed it did not receive the order, resulting in its failure to file an appeal.  What happened? The opponent/appellant’s email system automatically deleted the court’s email as spam.

The opponent/appellant asked the court to vacate the original order on the grounds of excusable neglect.  The trial court declined and Florida’s First District Court of Appeal affirmed. The Researching Paralegal cites these factors:

First, the review of the court clerk’s email logs confirmed that the email with the court’s order was served and received by the law firm’s server. Second, the law firm’s email configuration made it impossible to determine whether the firm’s server received the email. Third, the law firm’s former IT specialist’s advice against this configuration flaw was deliberately rejected by the law firm because its alternative cost more money.

The trial court concluded the law firm made a conscious decision to use a defective email configuration merely to save money, which was not “excusable neglect.”

Another nail in the coffin was testimony by the appellee’s attorney. His firm assigned a paralegal to check the court’s website every three weeks to safeguard that his firm would not miss any orders or deadlines.  The court held that the appellant had a duty to check the court’s electronic docket.

Emerald Coast Utilities Authority v. Bear Marcus Pointe, LLCCase No. 1D15-5714, Fla: Dist. Court of Appeals, 1st Dist (2017).

What can we learn from Emerald Coast?

  1. Whitelist important email. Set your spam or junk email filters to allow receipt of messages from approved senders or domains. Include courts, administrative agencies, key clients, opposing counsel, and any other senders whose email you don’t want to miss.
  2. Review spam quarantine summaries daily. Aggressive spam filters will occasionally block senders and domains you have added to your whitelist if the filter finds content in the email to be possible spam.  Addresses and domains may also change, causing new notices to be marked as spam.
  3. Don’t forget to look at your junk mail folder, another place where legitimate messages can land.
  4. Check online court dockets. Weekly will work for most firms; others may need to login daily, depending on case volume.
  5. Listen to your IT staff.  Here, the IT specialist argued against automatic deletion of junk and spam messages and recommended hiring a third-party vendor to handle spam filtering.  He also suggested investing in an online backup system, another idea rejected by the law firm.  Following either of these recommendations may have prevented the firm from missing the deadline.

A few more takeaways

  • It should be clear, but just in case:  everyone needs a backup system. If you can’t afford the cost of an online subscription, buy an external hard drive on sale and use the backup utility built into your operating system.  For backup protocols and additional backup options, see How to Backup Your Computer from the Professional Liability Fund (Practice Management > Forms > Technology).
  • Can’t afford a third-party vendor for spam filtering or another IT task?  Understandable, but the work itself still needs to get done. This may mean you, your partner, or your staff.  Technology is a tool, not a substitute for human judgment.

There are some other interesting twists and turns in Emerald Coast.  For examplethe law firm also refused to join in on a motion for a case management conference – a step that would have likely revealed the existence of the attorney fee award.  Additionally, automatic deletion of spam wasn’t the only email configuration procedure that caused problems for this office.  If you have a few moments, read the full opinion here.

Beverly Michaelis – All Rights Reserved 2017

Best of 60 Tips in 60 Minutes – 2017 ABA TECHSHOW

Yesterday I shared the Best in Mobile Apps for IOS and Android from the 2017 ABA TECHSHOW.  Today: the Best of 60 Tips in 60 Minutes with ideas on:

  • Blockchain Technology [A direct payment solution that bypasses banks]
  • Document and Workflow Automation
  • Document Indexing
  • Email
  • eSignatures
  • Facebook Advertising
  • Hardware Hacks
  • Lawyer Websites
  • Meeting Apps
  • Microsoft Office
  • Mirroring Content from Mobile Devices
  • Mobile Scanners
  • Note Taking
  • Online Collaboration
  • Online Intake
  • Organization
  • Outsourcing Tasks
  • Practice Management Software
  • Productivity
  • Proofreading
  • Saving Money
  • Scheduling Assistants
  • Security
  • Social Media Management
  • Slide Presentations
  • Spam
  • Timekeeping
  • Travel
  • Virtual Assistants
  • Web Conferencing

For a recap, click here or on the image below.

13 Resources for Protecting Data – Courtesy of the FTC

With data breaches in the news on an almost daily basis, how do you protect your law firm’s assets? What advice should you give to your clients?

The FTC offers a list of 13 data security resources to help you get started. From mobile apps to digital copiers and shutting down spam, there is a ton of good advice to be culled from these posts and PDFs: Continue reading