data security

Student studying math on the blackboard full of formulas

The Calculus of Risk, Tech Competence Edition

Rule 1.6(c)'s "reasonable efforts" is a duty of care. So let’s see how the calculus of risk plays out when we apply it to computer security.

Vacuum cleaner on a carpet with an extra clean strip

How To Securely Wipe a Hard Drive

Before you sell, give away, or throw out a computer, you need to wipe its hard drive clean.

Padlock and personal information with copyspace.

Russian Hackers Are Trading Your Email Credentials like Magic Cards

Another day, another security breach. Alex Holden, chief information security officer at Hold Security, discovered that 272 million emails are currently being traded in Russia’s criminal underworld. Nearly every major email provider was breached, including Google, Yahoo, and Microsoft. If you route your email through any of the providers mentioned, here are five steps you can take to […]

podcast-logo-post-image

Podcast #65: What You Need to Know About the Cloud Services You Use, with David Tollen

As more law firms go paperless, using cloud services for billing, timekeeping, and client files is common. But not all cloud services, especially those that offer free packages, will promise to keep your client data secure.

podcast-logo-post-image

Podcast #57: Apple vs. the FBI, with Megan Zavieh

Megan Zavieh explains what's at stake in the FBI's quest to force Apple to build a backdoor to the iPhone. But first, a good story about social media and the law.

shutterstock_313805942

The Lawyers’ Guide to Hacking Threats

As quickly as we build new technology to keep criminals out, hackers are working around the clock, and using sophisticated tools like Darkode, to climb your security walls. Prevent these attacks with a

shutterstock_285665918

Another Reason Not to Use Email for Confidential Communication

In a scheme called “spear phishing,” hackers are targeting small law firms that handle real estate transactions in order to steal client funds. The hackers sneak into the lawyer’s email accounts and monitor the emails between the lawyers, clients, and closing or title agents. When the day for closing comes, the hackers use the lawyer’s […]

shutterstock_155428856

Find Out Where Two-Factor Authentication is Available

You should be using two-factor authentication with your critical online accounts. It is one of the four steps we recommend taking in our security guide, because it is an easy way to drastically increase security. Two-factor authentication means using something you know (your password) and something you have (usually your phone, which most people keep […]

podcast-logo-post-image

Podcast #48: Law Firm Data Security, with Sharon Nelson and John Simek

On today's podcast, we ask security experts Sharon Nelson and John Simek things like how hard is it, really, to hack into someone's email? And what's the greatest security threat for lawyers? Plus, our favorite posts and podcasts of 2015.

7567984868_0bf2c2a62c_b

Passwords: a User Guide for Lawyers and Law Firms

Good passwords are essential to data security, and this article has everything you need to know about creating and keeping track of good passwords.

shutterstock_273194399

You Already Have an Ethical Obligation to be Technologically Competent

Sooner or later, your clients will find another lawyer if you waste their money and time on basic tasks because you aren’t proficient with your technology.

shutterstock_145699856

Best Practices for Protecting Client Information, According to the CFPB

New federal regulations promulgated by the Consumer Financial Protection Bureau will apply to real estate lawyers. But they are also a pretty solid starting point for any lawyer or law firm. Here’s a summary of the best practices, compiled by Law Technology Today’s Pegeen Turner: Create and implement a written Privacy and Information Security Policy […]

shutterstock_194382410

VPNs to Avoid Until they Plug Their Leaks

You know that here at Lawyerist, we are all about encouraging you to safeguard your data, and one of the ways to do that is to make sure you use a virtual private network (VPN) when you are using the coffee shop’s wi-fi connection. VPNs function in a few different ways, but at root they […]

computer security

Client Confidentiality in the Digital Age

The pathways for breaching client confidentiality — whether due to simple carelessness or inadequate security — continue to multiply as technology advances.

shutterstock_191113115

4 Ways to Secure Your Clients’ Information

A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. (Rule 1.6(c).) So what are reasonable efforts when it comes to your clients’ information stored on your computer? You have to make an effort, obviously. But how much effort […]