Security

Evaluating Cloud-Computing Providers

Moving your practice into “the cloud,” whether that involves a single application or all of your firm’s data, is not for everybody. But if you’re one of the many practitioners who have decided that there’s a compelling business case for employing cloud computing, it’s important that you do the appropriate research—and ask the relevant questions—to make sure you’re using a ...

Read More »

Possible LinkedIn Password Breach: Change Yours Now!

Technology blogs and news sites lit up this morning with news that millions of LinkedIn passwords had reportedly been leaked online.  According to The Verge: A user in a Russian forum is claiming to have hacked LinkedIn to the tune of almost 6.5 million account details. The user uploaded 6,458,020 hashed passwords, but no usernames. It’s not clear if they ...

Read More »

Adobe Acrobat X Pro: Redaction Tutorial

In the past, redaction could be a tedious (and expensive) nightmare.  Lengthy copies of documents would have to be printer, carefully examined word-for-word, and redacted manually with a thick black marker.  With Adobe Acrobat X Pro, you can quickly redact documents using a variety of built-in tools.  In this tutorial, we address: Using search-and-redact to easily locate sensitive information throughout ...

Read More »

IBM Opened Pandora’s Box When It Embraced BYOD

John and I loathe BYOD. It is a security nightmare. While most business agree, many have felt compelled to embrace BYOD (bring your own device) because, frankly, employees (and sometimes senior management) demanded it. Reading the story of IBM’s experience with BYOD is unnerving. It is sometimes argued that BYOD will save a company money. IBM’s CIO, Jeanette Horan, says it ...

Read More »

Lost Your Smartphone? Time to Remote Wipe

If you’re going to use a Smartphone, having the ability to remotely wipe it is essential. With remote wiping, if your device goes missing–whether via theft or simply by losing it–you can quickly take steps to erase all data from that device. Remote wiping requires that the device be connected to the service provider’s network, so it’s important to do ...

Read More »

Security Outside of the Office

Technology used to be firmly anchored in the office: bulky desktop computers, closet-filling servers, fax machines, and so forth. But as laptops have surged in popularity, and new technology like smartphones and tablets have emerged, lawyers are increasingly carrying their technology–and their clients’ data–with them outsideof the office. So how can you secure your technology on the go? Here are a ...

Read More »

Strong Password Refresher

Passwords are the first, and sometimes last, line of defense when it comes to data security. It’s vital to use strong passwords for all of your devices and accounts. What constitutes a strong password? Here’s a quick refresher: The length should be at least 8 characters, with some security experts now recommending 15+ characters. The password should include upper and lower case ...

Read More »