{"id":24503,"date":"2024-12-23T12:08:06","date_gmt":"2024-12-23T17:08:06","guid":{"rendered":"https:\/\/www.millerthomson.com\/?p=24503"},"modified":"2024-12-23T12:25:29","modified_gmt":"2024-12-23T17:25:29","slug":"data-security-risk-due-to-file-transfer-software-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/","title":{"rendered":"Data security risk due to file-transfer software vulnerabilities"},"content":{"rendered":"\n<p>Data and personal information shared through a third-party file transfer system is potentially at risk, according to recent alerts issued by the Canadian Centre for Cyber Security and the U.S. Cybersecurity and Infrastructure Security Agency.<a href=\"#_ftn1\" id=\"_ftnref1\">[1]<\/a><\/p>\n\n\n\n<p>In cases where data is compromised, for example, via ransomware attacks, the ultimate accountability and responsibility for the data lies with the organization that has custody and control of the data. This means organizations who use these third-party tools remain accountable to the individuals to whom the personal information pertains, including potential legal notifications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discovered zero-day vulnerabilities<\/h2>\n\n\n\n<p>The U.S. Cybersecurity and Infrastructure Security Agency has reported the discovery of serious vulnerabilities in Cleo\u2019s managed file transfer platforms, including Cleo Harmony, VLTrader, and LexiCom.<a href=\"#_ftn2\" id=\"_ftnref2\">[2]<\/a> These widely used platforms for secure file exchanges have been actively exploited by cybercriminals, including the Clop ransomware gang. The vulnerabilities, identified as CVE-2024-50623 and CVE-2024-55956, enable unauthorized access to sensitive data, resulting in breaches and data theft.<a href=\"#_ftn3\" id=\"_ftnref3\">[3]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities and exploits<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>CVE-2024-50623:<\/strong> This flaw, disclosed in October 2024, enables unrestricted file uploads and downloads, allowing remote code execution. Despite a patch, attackers continue exploiting it via a backdoor.<\/li>\n\n\n\n<li><strong>CVE-2024-55956:<\/strong> Discovered in December 2024, this vulnerability allows attackers to upload arbitrary files, including a JAVA backdoor (&#8220;Malichus&#8221;), enabling data theft and further access to compromised networks.<\/li>\n<\/ol>\n\n\n\n<p>Both vulnerabilities are being actively targeted by the Clop ransomware gang, posing a serious risk due to their high level of severity.<a href=\"#_ftn4\" id=\"_ftnref4\">[4]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Immediate actions to take<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Update Your Systems:<\/strong> Ensure that you are using the latest versions of Cleo Harmony, VLTrader, and LexiCom (version 5.8.0.24 or higher).<a id=\"_ftnref5\" href=\"#_ftn5\">[5]<\/a><\/li>\n\n\n\n<li><strong>Monitor for Signs of Compromise<\/strong>: Be vigilant for unusual activities within your network, such as unexplained file uploads or changes in file integrity.<\/li>\n\n\n\n<li><strong>Assess Vendor Risk:<\/strong> If your vendors use Cleo products, it is crucial to confirm that they have applied the necessary patches and are actively monitoring their systems for signs of attack. Ensure that your third-party risk management processes include checks on vendor cybersecurity practices.<a id=\"_ftnref6\" href=\"#_ftn6\">[6]<\/a><\/li>\n\n\n\n<li><strong>Review Data Access Protocols:<\/strong> Implement stricter access controls and enable multi-factor authentication (MFA).<\/li>\n\n\n\n<li><strong>Consult with Experts:<\/strong> Contact your cybersecurity team if you suspect a breach.<\/li>\n\n\n\n<li><strong>Prepare for Ransomware Protection:<\/strong> Regularly test backups and review your incident response plan.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The exploitation of these vulnerabilities poses a critical data security threat. Implement the necessary updates and security practices to protect your organization from potential breaches.<\/p>\n\n\n\n<p>If you have any questions or would like further information regarding how your organization can enhance its cybersecurity and data protection strategies, please contact a member of the Miller Thomson LLP <a href=\"https:\/\/www.millerthomson.com\/en\/expertise\/technology-ip-and-privacy\/\">Technology, IP and Privacy<\/a> Group.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> Canadian Centre for Cyber Security, \u201cAlert &#8211; Vulnerability impacting all versions of Cleo VLTrader, Harmony, and LexiCom software\u201d (December 11, 2024), online: <em>Government of Canada<\/em> &lt;www.cyber.gc.ca\/en\/alerts-advisories\/vulnerability-impacting-all-versions-cleo-vltrader-harmony-and-lexicom-software&gt;. See also Lawrence Abrams, \u201cClop ransomware claims responsibility for Cleo data theft attacks\u201d (December 15, 2024), online: <em>BleepingComputer<\/em> &lt;www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks\/&gt;.<\/p>\n\n\n\n<p><a href=\"#_ftnref2\" id=\"_ftn2\">[2]<\/a> Mathew J Schwartz, \u201cClop Ransomware Takes Responsibility for Cleo Mass Exploits\u201d (December 16, 2024), online: <em>Gov Info Security <\/em>&lt;www.govinfosecurity.com\/clop-ransomware-takes-responsibility-for-cleo-mass-exploits-a-27074&gt;.<\/p>\n\n\n\n<p><a href=\"#_ftnref3\" id=\"_ftn3\">[3]<\/a> Scott T Lashway et al., \u201cPatch, Investigate, and Defend: Critical and High Vulnerabilities in Cleo Managed File Transfer Solutions Reportedly Under Attack\u201d (December 17, 2024), online: <em>National Law Review<\/em> &lt;natlawreview.com\/article\/patch-investigate-and-defend-critical-and-high-vulnerabilities-cleo-managed-file&gt;.<\/p>\n\n\n\n<p><a href=\"#_ftnref4\" id=\"_ftn4\">[4]<\/a> <em>Ibid.<\/em><\/p>\n\n\n\n<p><a href=\"#_ftnref5\" id=\"_ftn5\">[5]<\/a> <em>Scott T Lashway et al., supra<\/em> note 3.<\/p>\n\n\n\n<p><a href=\"#_ftnref6\" id=\"_ftn6\">[6]<\/a> <em>Ibid.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data and personal information shared through a third-party file transfer system is potentially at risk, according to recent alerts issued by the Canadian Centre for Cyber Security and the U.S. Cybersecurity and Infrastructure Security Agency.[1] In cases where data is compromised, for example, via ransomware attacks, the ultimate accountability and responsibility for the data lies [&hellip;]<\/p>\n","protected":false},"author":86,"featured_media":14393,"parent":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531,557],"insight-format":[418,416],"class_list":["post-24503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-technology-ip-and-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data security risk due to file-transfer software vulnerabilities | Miller Thomson<\/title>\n<meta name=\"description\" content=\"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data security risk due to file-transfer software vulnerabilities | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-23T17:08:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-23T17:25:29+00:00\" \/>\n<meta name=\"author\" content=\"Nyeisha Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nyeisha Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\"},\"author\":{\"name\":\"Nyeisha Murray\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/8c49b710501a2ba22438ca72fb0c0c85\"},\"headline\":\"Data security risk due to file-transfer software vulnerabilities\",\"datePublished\":\"2024-12-23T17:08:06+00:00\",\"dateModified\":\"2024-12-23T17:25:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\"},\"wordCount\":559,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\",\"Technology, IP and Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\",\"name\":\"Data security risk due to file-transfer software vulnerabilities | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg\",\"datePublished\":\"2024-12-23T17:08:06+00:00\",\"dateModified\":\"2024-12-23T17:25:29+00:00\",\"description\":\"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg\",\"width\":1776,\"height\":994},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data security risk due to file-transfer software vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/8c49b710501a2ba22438ca72fb0c0c85\",\"name\":\"Nyeisha Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ec01113c3c7208ac683f05f5b7f25e187ddf5deabc82d0d9e12aeca8d3b9c851?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ec01113c3c7208ac683f05f5b7f25e187ddf5deabc82d0d9e12aeca8d3b9c851?s=96&d=mm&r=g\",\"caption\":\"Nyeisha Murray\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data security risk due to file-transfer software vulnerabilities | Miller Thomson","description":"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Data security risk due to file-transfer software vulnerabilities | Miller Thomson","og_description":"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2024-12-23T17:08:06+00:00","article_modified_time":"2024-12-23T17:25:29+00:00","author":"Nyeisha Murray","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Nyeisha Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/"},"author":{"name":"Nyeisha Murray","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/8c49b710501a2ba22438ca72fb0c0c85"},"headline":"Data security risk due to file-transfer software vulnerabilities","datePublished":"2024-12-23T17:08:06+00:00","dateModified":"2024-12-23T17:25:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/"},"wordCount":559,"commentCount":0,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg","articleSection":["Cybersecurity","Technology, IP and Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/","name":"Data security risk due to file-transfer software vulnerabilities | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg","datePublished":"2024-12-23T17:08:06+00:00","dateModified":"2024-12-23T17:25:29+00:00","description":"Protect your business from file-transfer software vulnerabilities with actionable steps to prevent data breaches and ransomware.","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Technology-IP-and-Privacy_Post-Image.jpg","width":1776,"height":994},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-security-risk-due-to-file-transfer-software-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Data security risk due to file-transfer software vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/8c49b710501a2ba22438ca72fb0c0c85","name":"Nyeisha Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ec01113c3c7208ac683f05f5b7f25e187ddf5deabc82d0d9e12aeca8d3b9c851?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec01113c3c7208ac683f05f5b7f25e187ddf5deabc82d0d9e12aeca8d3b9c851?s=96&d=mm&r=g","caption":"Nyeisha Murray"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/24503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=24503"}],"version-history":[{"count":0,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/24503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14393"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=24503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=24503"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=24503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}