Is Evernote Secure Enough for Client Data?
The other day on the MILO list, someone said they were exploring using Evernote to manage client files. I responded that I do not think it is a good idea. Here are my reasons.
Passwords: a User Guide for Lawyers and Law Firms
Good passwords are essential to data security, and this article has everything you need to know about creating and keeping track of good passwords.
Heartbleed: What Lawyers and Law Firms Need to Know
What the Heartbleed security breach really means for lawyers and law firms, without too much techno-jargon or over-use of dumbed-down metaphor.
The Internet: a Primer for Lawyers and Everyone Else
"If you don't have a basic understanding of the technology you entrust with your clients' information … I think you probably are not competent to represent anyone."
Viivo Secures Your Client Files in the Cloud
Viivo’s security looks rock-solid. Your data is encrypted before it leaves your computer, and you keep the encryption keys. To be frank, I'm sold.
Yes, the NSA is Intercepting Attorney-Client Communications
"NSA has afforded, and will continue to afford, appropriate protection to privileged attorney-client communications acquired during its lawful foreign intelligence mission."
Encryption: Enabling Basic Client File Security
Client file security through encryption is easy. Here's how to do it, and why you really need to.
Is Dropbox Right for Your Practice?
Dropbox is an extremely popular cloud computing option. Just because it's popular, however, does not mean it's right for your practice. Here are some things to consider before using Dropbox in your practice.
Social Engineering May Be a Greater Threat to Client Files Than “Hackers”
I just finished reading hacker Kevin Mitnick‘s book, Ghost in the Wires, about his escapades leading up to his imprisonment for hacking. What struck me was how much of his “hacking” was really social engineering. Quite often, Mitnick just called someone on the phone and asked them for what he needed: up to and including […]
Yahoo! “Objected Strenuously” to the NSA’s PRISM Program
“The [FISA] Court found that the protections that the Executive Branch had established were reasonable under the Constitution, especially with regard to the rights of non-U.S. persons.”
Your Wi-Fi is Leaking
Sure, you’ve heard that people can “listen in” on your Internet connection when you connect to an unsecured wi-fi connection, like at a coffee shop. But what does that really mean? PC World’s Eric Geier went and found out. Turns out, an eavesdropper can get usernames, passwords, and the contents of your messages. And hijacking […]
Q: Doesn’t My Password Protect My Computer?
A: No. There are basically two “doors” to your computer. Your password only protects one.
Don’t Trust the Cloud? Microsoft Gives the Keys to Windows to the NSA
If you were laboring under the illusion that your data is somehow safer on your own computer than in the cloud, let’s just put an end to that fallacy.
Does “Don’t Be Evil” Mean “Give the NSA Direct Access to Our Servers”?
According to the Washington Post, the NSA is mining data “directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” Isn't this evil?
Cloud Computing: Who Owns the Servers That Will House Your Law Firm’s Data?
Lawyers seeking to use cloud computing in their law practices must research their cloud provider's relationship with the facility housing the cloud servers