data security

How to Avoid Spoofing, Spear Phishing, and Social Engineering Attacks

With spear phishing attacks like CEO spoofing, sophisticated email scammers can compromise corporations and law firms.

How Legal Software Companies Protect Client Data in the Cloud

What about the companies to which we entrust our clients' information? Do they take confidentiality as seriously as lawyers and clients do?

4 Ways to Secure Your Clients’ Information

So what are reasonable efforts when it comes to your clients’ information stored on your computer? You have to make an effort, obviously. But how much effort is so unreasonable that you don’t have to make it?

The Calculus of Risk, Tech Competence Edition

Rule 1.6(c)'s "reasonable efforts" is a duty of care. So let’s see how the calculus of risk plays out when we apply it to computer security.

How To Securely Wipe a Hard Drive

Before you sell, give away, or throw out a computer, you need to wipe its hard drive clean.

Podcast #65: What You Need to Know About the Cloud Services You Use, with David Tollen

Podcast #57: Apple vs. the FBI, with Megan Zavieh

The Lawyers’ Guide to Hacking Threats

As quickly as we build new technology to keep criminals out, hackers are working around the clock, and using sophisticated tools like Darkode, to climb your security walls. Prevent these attacks with a

Another Reason Not to Use Email for Confidential Communication

In a scheme called "spear phishing," hackers are targeting small law firms that handle real estate transactions in order to steal client funds.

Find Out Where Two-Factor Authentication is Available

You should be using two-factor authentication with your critical online accounts. It is one of the four steps we recommend taking in our security guide, because it is an easy way to drastically increase security.

Podcast #48: Law Firm Data Security, with Sharon Nelson and John Simek

Passwords: a User Guide for Lawyers and Law Firms

Good passwords are essential to data security, and this article has everything you need to know about creating and keeping track of good passwords.

You Already Have an Ethical Obligation to be Technologically Competent

Sooner or later, your clients will find another lawyer if you waste their money and time on basic tasks because you aren’t proficient with your technology.

VPNs to Avoid Until they Plug Their Leaks

You know that here at Lawyerist, we are all about encouraging you to safeguard your data, and one of the ways to do that is to make sure you use a virtual private network (VPN) when you are using the coffee shop’s wi-fi connection.

Client Confidentiality in the Digital Age

The pathways for breaching client confidentiality — whether due to simple carelessness or inadequate security — continue to multiply as technology advances.