The LMT Blog

James Keeler Earns (CISSP) Certification

Nov 19, 2019 9:00:00 AM / by April L. Sy posted in IT, Cybersecurity


Cybersecurity Manager, James Keeler, Earns Certified Information Security Systems Professional (CISSP) Certification

Rochester, NY, November 19, 2019 – James Keeler, Cybersecurity Manager, LMT Technology Solutions, has earned the Certified Information Security Systems Professional (CISSP) Certification granted by (ISC)2. CISSP certification is one of only three certifications that meet Department of Defense requirements for several high-level information security positions; and is used as the baseline for the National Security Agency-developed ISSEP program. James joins an elite group of information security professionals who have demonstrated a dedication to higher standards of practice in cybersecurity.

Read More

Are You Ready for the NY SHIELD Act?

Oct 30, 2019 9:38:45 AM / by James Keeler posted in IT, Cyber-Security


Read More

Something New is Launching at LMT

Oct 29, 2019 8:20:10 AM / by LMT Tech posted in IT, security, technology


Knowledge and Trends
Read More

Cyber Insurance Clauses - Have You Read the Fine Print?

Sep 10, 2019 12:12:00 PM / by James Keeler posted in IT, Cyber-Security, #cyberinsurance


A client recently reached out to me about their Cyber Insurance coverage asking if the coverage limits looked reasonable. Since Cyber Insurance is a new insurance product, it’s no wonder that there is a lot of mystery around these policies. Let’s take a look at some insights that can help you ask the right questions and make the correct choices for your business when it comes to Cyber Insurance.

Ransomware attacks and data breaches are all over the news; naturally businesses are interested in acquiring coverage to help protect themselves financially from these threats. When evaluating Cyber Insurance, most businesses focus on coverage limits. However, the biggest concern is reviewing the actual policy clauses rather than just the coverage limits. You can have a $5 million policy, but if the claims are denied due to unnoticed clauses in the policy, then the coverage limit doesn’t really matter. The devil is in the details.

Key Items to Look for in a Cyber Insurance Policy:

  • Cyber Extortion/Ransomware
    Does the policy only cover the ransom payment, or do you have an option to resolve the incident without paying the ransom and have those costs covered?

  • Data Loss & Recovery
    Are lost productivity/business losses covered in the event of malware erasing your files? Are data recovery costs included in the coverage?

  • Civil Suit Coverage
    Is reimbursement for defending against civil suits brought by victims of fraud or identity theft resulting from a breach of your business’s data covered?

  • Fines & Breach Notification
    Are regulatory fines (HIPAA, NYS DFS, etc.) and/or the costs associated with disclosing, notifying, and providing credit monitoring for victims whose data was lost in a breach of your business data covered?

  • Cyber Terrorism/Act of War Coverage
    If a cyberattack is deemed to be the result of a foreign government or terrorist group’s action, will it still be covered? What is the threshold for this determination?

  • Actual Financial Loss & Remediation and Investigation (value of cash/goods lost due to fraud & IT and legal professional costs)
    Are both of these items included in coverage, is it an either/or, or is only one side of this covered?
  • Exclusions
    Some policies exclude anything that originated from Social Engineering or that might be covered under your general Business Insurance policy. What specifically is not covered under the policy?

Not all policies offer the same coverage and it’s important that you carefully review this new product with your insurance agent to make sure you’re financially protected in the manner you’re expecting. Your Cyber Extortion policy may only cover paying the ransom (which may or may not actually result in restoration of your files) and may not cover the cost for IT professionals (like LMT) to restore data from backups. If that’s the case, you’re gambling that the criminals victimizing you have purchased or written ransomware that can actually restore all your files. There are a large number of reasons the criminals behind the ransomware may not be able to restore the files – see our previous post “Should I Pay the Ransom?” for more details on these.

Read More

Should I Pay the Ransom?

Jul 9, 2019 1:05:15 PM / by James Keeler posted in IT, Cyber-Security, Ransomware


Read More

Prepare for Microsoft End of Life Products

Jul 1, 2019 12:30:00 PM / by James Keeler posted in IT, Microsoft End of Life, Windows 7


Microsoft will be ending support on January 14, 2020 for:
Windows 7 • Windows 2008 • Windows 2008 R2 • SQL 2008 • Exchange 2010 • Windows Mobile

Read More

Resurgence of Malvertising

Jun 28, 2019 11:56:15 AM / by James Keeler posted in IT, Cyber-Security


GreenFlash Sundown exploit kit has been repurposed to drop a botnet, cryptominer, and very potent ransomware (all three at once) via drive-by downloads served via website ads. This kit hadn’t been targeted at North America previously but this recent repurposing has been designed to primarily attack English language users in North America.

The biggest mitigations are fully patched Flash & web browsers, safe and careful browsing habits, and being trained in security awareness to learn to avoid clicking links in emails that may be trying to direct you to a site serving the malvertisement.

Also, interesting note – the exploit kit executes a system check to make sure the environment is “desirable” before it fires the main payload, so the same malicious ad may trigger ransomware on one system but not another.


Read More

Takeaways From The ALA

May 15, 2019 8:43:00 AM / by LMT Tech


Many years of membership and engagement with the Western NY chapter of the Association of Legal Administrators (ALA) prompted LMT to attend the 2019 ALA Annual Conference & Expo in Grapevine, TX. The ALA gathering assembles legal management and administrative staff, including single attorney offices and large law firms, from across the U.S. to learn and network around the latest legal trends in technology, HR, billing, and more. Cloud computing, disaster recovery, and compliance were hot topics among attendees and speakers.

Read More

Cybersecurity Threats in 2019

Mar 26, 2019 5:07:28 PM / by LMT Tech posted in IT, security, technology


We hate to be the bearer of bad news, but 2019 and beyond will surely bring more waves of ransomware, phishing, new laws and regulations, and attacks utilizing information technology as a threat vector. Tax season is upon us and is a particularly high threat time of year with internet phishing scams that lead to tax-related fraud and identity theft.

Read More

The Trends We Saw in 2018

Feb 8, 2019 12:41:26 AM / by LMT Tech posted in industries, IT, security, technology


As the new year unfolds, we want to take a moment to look back at the top cybersecurity and information technology trends we saw in 2018.

Read More
Share on Social: