Quantcast
Channel: cybersecurity Archives - Law Technology Today
Browsing all 73 articles
Browse latest View live

A Little Knowledge Goes a Long Way in Protecting Your Online Accounts

Hardly a day goes by without hearing about someone getting an online account “hacked.” Understanding how this type of “hacking” occurs in most situations will go a long way toward helping you protect...

View Article



Encryption of Mobile Devices: A Security No-Brainer

As attorneys continue to increasingly embrace mobile technology like laptops, smartphones, tablets, external hard drives, and USB (thumb) drives, it is critical for them to understand and address the...

View Article

In Brief: The Shellshock or “Bash Bug”

Introducing Shellshock.  Also known as the “Bash Bug,” Shellshock exploits a system application found on many computers called Bash that translates “shell” commands into something your device can...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity 2017: It’s a Scary World Out There

Although lawyers are a tech savvy bunch, ABA TECHREPORT 2016 suggests that they lack security prowess. With all the publicly expressed concern about internet security breaches, the data shows that – as...

View Article

Image may be NSFW.
Clik here to view.

Watch: Cybersecurity 2017: It’s a Scary World Out There

Although lawyers are a tech savvy bunch, ABA TECHREPORT 2016 suggests that they lack security prowess. With all the publicly expressed concern about internet security breaches, the data shows that – as...

View Article


Choosing the Right IT Managed Services Provider Is Crucial

Has your firm received a security compliance survey from a potential or current client? The answer several years ago was most likely no. Today, however, it is most likely yes. Information security is...

View Article

Image may be NSFW.
Clik here to view.

Real-World Zero-Day Threat Detection and Response

The FBI recently published an alert warning that ransomware variants have targeted and compromised vulnerable business servers. The alert states that cyber-attackers target hosts, which potentially...

View Article

Addressing Your Legal Hiring Needs in Privacy and Data Security

Every week seems to bring news of a massive data breach in the corporate or governmental realm. Its impact is felt on the personal (identity theft), business (loss of profit and goodwill, fines and...

View Article


Image may be NSFW.
Clik here to view.

Watch: Real-World Zero-Day Threat Detection and Response

The FBI recently published an alert warning that ransomware variants have targeted and compromised vulnerable business servers. The alert states that cyber-attackers target hosts, which potentially...

View Article


Enhance FINRA’s Cybersecurity Checklist With These Three Security Resources

Every year, the Financial Industry Regulatory Authority (FINRA) releases a letter examining the most pressing issues threatening the financial services industry. Unsurprisingly, cybersecurity remains...

View Article

Cybersecurity for Macs

If you have a Mac, you might think you’re safe from viruses and hacking. In reality, Mac users still fall victim to malware, adware, and other schemes that can easily slip through the cracks if a user...

View Article

Working Together for Mutual Defense

In the last decade, cybersecurity has become a major concern for businesses. A threat that was once paid lip service now dominates headlines on a monthly, if not weekly, basis. WannaCry and the latest...

View Article

Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a...

In this episode of Digital Detectives, hosts Sharon Nelson and John Simek speak with Denver Edwards about cybersecurity. In their discussion, they address the National Institute of Standards and...

View Article


The Great ESI Sales Exodus

The yearning of business development professionals eager to sell offerings beyond the highly commoditized ESI (Electronically Stored Information) play coupled with the rapid consolidation of...

View Article

Image may be NSFW.
Clik here to view.

Leveraging the SAFETY Act: Building an Effective Security Program

As enterprises face increasingly dynamic risks to their business—including attacks that can entail physical, technological, and especially operational impacts—a common question posed by many...

View Article


Working Together for Mutual Defense

In the last decade, cybersecurity has become a major concern for businesses. A threat that was once paid lip service now dominates headlines on a monthly, if not weekly, basis. WannaCry and the latest...

View Article

Three Common Cybersecurity Mistakes that Could Get You in Trouble

The Panama Papers scandal, the security breach of two prominent New York law firms, and other recent breaches and hacks have moved cybersecurity to the top of most law firms priority lists. However,...

View Article


Transforming E-Discovery and Cybersecurity Careers With Free Training and...

In 2018, advanced training and education for existing or aspiring cybersecurity and e-discovery professionals will become more critical than ever. With an estimated 2.5 million person talent gap...

View Article

Image may be NSFW.
Clik here to view.

Watch: How Cybersecurity Risk Affects the Bottom Line

Law firms and attorneys know that the likelihood of a cyber-attack is high and acknowledge that the industry is under siege from cybercriminals. Nothing affects a law firm’s bottom line more than lost...

View Article

DoD DFARS Cybersecurity Compliance Regulations

Regardless of your legal experience or scope of practice, you’ve probably heard about the Department of Defense’s Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity compliance...

View Article
Browsing all 73 articles
Browse latest View live




Latest Images