- Log In
Helping lawyers manage and grow small law firms.
With "CEO spoofing," sophisticated email scammers can compromise corporations and law firms by making them believe that requests for information or money come from the CEO themselves.
What about the companies to which we entrust our clients' information? Do they take confidentiality as seriously as lawyers and clients do?
A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. (Rule 1.6(c).) So what are reasonable efforts when it comes to your clients’ information stored on your computer? You have to make an effort, obviously. But how much effort […]
Rule 1.6(c)'s "reasonable efforts" is a duty of care. So let’s see how the calculus of risk plays out when we apply it to computer security.
Before you sell, give away, or throw out a computer, you need to wipe its hard drive clean.
Another day, another security breach. Alex Holden, chief information security officer at Hold Security, discovered that 272 million emails are currently being traded in Russia’s criminal underworld. Nearly every major email provider was breached, including Google, Yahoo, and Microsoft. If you route your email through any of the providers mentioned, here are five steps you can take to […]
As more law firms go paperless, using cloud services for billing, timekeeping, and client files is common. But not all cloud services, especially those that offer free packages, will promise to keep your client data secure.
Megan Zavieh explains what's at stake in the FBI's quest to force Apple to build a backdoor to the iPhone. But first, a good story about social media and the law.
As quickly as we build new technology to keep criminals out, hackers are working around the clock, and using sophisticated tools like Darkode, to climb your security walls. Prevent these attacks with a
In a scheme called “spear phishing,” hackers are targeting small law firms that handle real estate transactions in order to steal client funds. The hackers sneak into the lawyer’s email accounts and monitor the emails between the lawyers, clients, and closing or title agents. When the day for closing comes, the hackers use the lawyer’s […]