About dooley

This author has not yet filled in any details.
So far dooley has created 13 blog entries.

Why “We Have Backups” Doesn’t Mean You’re Protected

In this video, we take a direct look at one of the most dangerous assumptions law firms make: believing backups are running — and working — without ever verifying what’s actually being protected.

Why “We Have Backups” Doesn’t Mean You’re Protected2026-02-19T15:09:03+00:00

Why Data Retention Is One of the Most Overlooked IT Risks for Law Firms

In this video, we focus on a critical — and often misunderstood — part of law firm IT: data retention. Many firms believe that having backups means their data is protected, without realizing that retention determines how long that data is actually available when it’s needed most.

Why Data Retention Is One of the Most Overlooked IT Risks for Law Firms2026-02-18T22:11:34+00:00

Strong Firewalls Aren’t Enough: Why Law Firm Security Fails from the Inside

In this video, we share a “nightmare” IT scenario that law firms often don’t see coming. Even with top-tier firewalls and antivirus tools in place, firms can still be exposed through everyday internal behaviors — especially how files are shared with clients.

Strong Firewalls Aren’t Enough: Why Law Firm Security Fails from the Inside2026-02-18T21:36:25+00:00

The Hidden IT Risk Law Firms Miss: When Your Infrastructure Becomes a Back Door

In this video, we unpack a common — and often overlooked — security risk facing law firms today: internal file sharing. Even firms with strong firewalls and antivirus tools can be exposed if permissions and sharing settings aren’t properly configured.

The Hidden IT Risk Law Firms Miss: When Your Infrastructure Becomes a Back Door2026-02-18T21:15:38+00:00

When “We Have Backups” Isn’t Enough: A Real Law Firm Recovery Story

In this video, we walk through a real situation where a law firm reached out to N8 Solutions after being hit by a crypto virus. Like many firms, they believed their backups would protect them — until they discovered critical gaps that put their data at risk.

When “We Have Backups” Isn’t Enough: A Real Law Firm Recovery Story2026-02-18T20:59:10+00:00

Double Extortion, Targeted Backups, and MFA Gaps: How Hackers Exploit Law Firms

Cyberattacks against law firms have become more complex, more destructive, and more costly. What once looked like simple ransomware infections, where files were encrypted until a ransom was paid, has evolved into sophisticated campaigns designed to cause maximum harm.

Double Extortion, Targeted Backups, and MFA Gaps: How Hackers Exploit Law Firms2025-09-22T17:11:59+00:00

Why Law Firms Are Prime Targets for Cyberattacks (and How to Protect Yours)

Nearly 40% of U.S. law firms have already suffered a breach. The costs — financial, legal, ethical, and reputational — can devastate even established practices. Yet most of these breaches exploit preventable weaknesses.

Why Law Firms Are Prime Targets for Cyberattacks (and How to Protect Yours)2025-09-15T16:35:34+00:00
Go to Top