Developing a Power User for Your Office: Improving Efficiency and Security
Suggestions for finding a staff member to lead the team in technology matters so that everything runs more efficiently. Read More +
How Secure Is Your Email?
Have you ever worried about the security of your email? If you have, you are probably not unlike many people who transmit sensitive data electronically. Some of the most widely used types of email services use Transport Layer Security (“TLS”) to encrypt your message (Gmail, Yahoo!, Outlook.com, Exc… Read More +
Mobile Security for the Family Lawyer
Consider this scenario: a client has retained your domestic law firm to help her plan for a future separation from her spouse. When you meet, the client makes clear that her spouse does not know of the separation plans and she does not want him to find it out. She makes it clear that she does not even want her … Read More +
The Ethics of Cloud Computing and Software as a Service
Tips for using cloud services ethically Read More +
Understanding Important Cyber Security Issues
How well do you understand your data security? If you’re confused by all the issues needing to be addressed, you’re not alone. Recent events at Sony Entertainment show that anyone is vulnerable if they don’t keep their systems updated. Credit card data theft at large stores such as Target and… Read More +
Frauds and Scams that Target Lawyer Trust Accounts
The State Bar continues to receive reports of frauds and scams on lawyer trust accounts resulting in six-figure losses. The three major types of scams are 1) Email initiated counterfeit bank checks 2) Forged trust account checks, and 3) Compromised wire instructions. The following is a brief s… Read More +
Real Estate Attorneys Take Note: Funds Transfer Fraud or Social Engineering Fraud?
Coverage options to protect your firm from fraudulent acts.. Read More +
Avoiding Taxpayer Scams during Tax Season
Tips to avoid being the victim of a tax scam. Read More +
Keys to Selecting a Cloud Storage Provider
Tips for maintaining confidentiality while storing files online. Read More +
Keeping Your Passwords Strong and Secure
Computer passwords are the keys that “unlock” our computer and network systems. We all have more passwords than we can remember. This tends to make us a bit lazy. We use obvious and easy-to-remember passwords – even the word “password” itself. Or worse: we don’t use them at a… Read More +
Mobile Device Security: Has Your Client's Smartphone Been Hacked?
If you're a litigator, cell phones can be a powerful tool in discovery. They may contain a client's (or opposing party's) text messages, e-mails, GPS data, personal photographs, social media, data files and let’s not forget - they also contain phone call records. Modern smartphones do so many things… Read More +
A 5 Item List to Check Twice- Getting Your Firm’s Security Plan Off the Naughty List
5 steps to improve office security Read More +
Electronic Records Retention and Destruction
Managing the storage and destruction of electronic client files. Read More +
Lawyers Are Real-life Superheroes in Cyber-Wars
Information to increase awareness in the battle against cyber threats. Read More +
Why Am I Getting Such Grief About Putting Testimonials on My Website?
Q&A regarding the issues of including client testimonials on an attorney's website Read More +
The Best Approach to Cybersecurity: Being Proactive
Steps to help protect your data from cyber attacks Read More +
Increasing Your Online Banking Safety
Pointers to protect your law firm's bank account during online transactions Read More +
Lawyers Beware: A Single Data Breach Can Bring Down a Practice
The dangers of being underinsured for a data breach Read More +
Bar Study Tips, Hashtags & Retweets: Lawyers Mutual Student Resource Center
Resources available to law school students through Lawyers Mutual Read More +
Internet Explorer Bug Squashes Browser Reliability
Reasons why you should switch from using internet explorer to another browser. Read More +