Security

Encryption in the Cloud: BoxCryptor

I have been looking for an easy and affordable way to encrypt my electronic documents stored in the cloud.  My preferred cloud storage options at this time are either Microsoft SkyDrive or Dropbox.  However, neither provide me with complete assurance that their existing security adequately protects documents that I want to keep completely confidential. After trying Viivo (formerly SecretSync) I found ...

Read More »

Tech Mysteries: How Did My Computer Know …?

We’ve all had the how did it know?! moment when using technology. Perhaps you opened a restaurant review website and it listed restaurants near your office without asking for an address. Or maybe you spent a few minutes shopping online for a new coffee table, and now every site you visit seems to have advertisements for coffee tables. Much of this can ...

Read More »

Encryption: A Guide for Lawyers

Attorneys have an obligation to protect their client’s data from unauthorized access, and there are few methods of protection more effective than encryption. When communicating over the Internet on wired/wireless networks, or on multiple devices, you risk losing valuable information to unwanted guests. Not protecting your data is dangerous, and while encryption sounds complicated, it’s an easy solution that will ...

Read More »

Quick Tip: Use Automatic Screen Lock

With the profession changing rapidly, many lawyers find themselves practicing in non-traditional settings: from their homes, from shared office spaces, or from a client’s office just to name a few examples.  This change in setting can mean less control over who has physical access to your computer. One simple way to protect yourself is to enable automatic screen locking.  Once ...

Read More »

5 Steps to a Better Backup Strategy

Securing and protecting your firm’s data is essential. Client files, important communications and valuable work product often exist exclusively in digital format today, and thus a major data loss could have catastrophic professional and ethical ramifications. Whether you’re revisiting an existing backup strategy or seriously implementing one for the first time, we’ve put together a five-step plan to help you ...

Read More »

A Mobile Security Checklist

Adapted and excerpted from Locked Down: Information Security for Lawyers (2012) by Sharon D. Nelson, David G. Ries, and John W. Simek, now available from LPM Publishing. Smartphones and tablets offer great benefits to attorneys and law firms. They also present great risks. It is critical for attorneys to understand and address these risks, particularly in the area of safeguarding ...

Read More »

Wisconsin Weighs in on Metadata Ethics

As we wrote earlier this year, metadata — the hidden information in electronic files — is a significant concern for lawyers.  Metadata can contain important and revealing information ranging from the document’s origins to detailed records of changes and comments left during the document’s creation.  If proper care isn’t taken, a lawyer can easily reveal confidential information to opposing counsel and/or ...

Read More »

Quick Tip: Ditch the Laptop Bag

Stand on a crowded train platform in any major city and you won’t have much trouble spotting the people carrying laptops.  The giveaway is usually their bag: bags made by companies who only produce laptop bags and computer accessories; backpacks emblazoned with computer brand names or logos; over-sized designer handbags with laptops or expensive tablets clearly protruding. Unfortunately, these conspicuous ...

Read More »

Smart Tech for Small Firms

Solo and small sized law firms must take a strategic approach to ensure they buy the right technology for their practice. When compared to larger law firms, solo and small firms have limited time and resources, so it’s crucial they find the sweet spot when selecting essential hardware and software. In the upcoming CLE program from the ABA Law Practice ...

Read More »

Millions of Apple UDIDs Reportedly Stolen

Reports are circulating today that the hacktivist group Antisec has obtained more than 12 million Apple UDIDs by compromising an FBI-owned laptop.  UDIDs are unique identifiers embedded in each Apple device, including iPhones and iPads. As proof of their claim, the group released a file containing 1,000,000 UDIDs.  The group claims that the full data set includes not just UDIDs ...

Read More »