security

Confidential Concept. Word on Folder Register of Card Index. Selective Focus.

How Legal Software Companies Protect Your Clients’ Information in the Cloud

What about the companies to which we entrust our clients' information? Do they take confidentiality as seriously as lawyers and clients do?

3D rendering, Green lock locked safe, red padlock unlocked risk of lost for digital data. Security of information systems background.

Your Smart Locks and Smart Thermostats Are Definitely Not Smart, Security-Wise

The Internet of Things—everyday objects like locks and thermostats that interface with your smartphone and your home network—remains ridiculously insecure.

Internet security concept. Laptop and safe lock with password. 3d

Stop Changing Your Password All the Time

You should be free of the tyranny of changing your passwords all the time. Research shows it may make things much less secure.

skype-logo-open-graph-100272884-large

Is Skype Safe for Attorney-Client Communication?

Skype, Microsoft's video, audio, and messaging platform, is shifting away from a peer-to-peer network and will run in the cloud. Here's why that might not be a great thing for you and your clients who want to use that app to communicate with you.

Wall of email, spam and virus electronic mail envelopes

How to Recognize a Risky Email

There are a number of different types of risky emails. Here's how to recognize—and arm yourself against—some of them.

trust word as a password to combination puzzle box with rings of letters

Thanks to Google, You May Never Need a Password Again

The good news: Google is working on a project that could eliminate the need to use passwords. The bad news: it involves learning pretty much everything about you.

shutterstock_191113115

4 Ways to Secure Your Clients’ Information

A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. (Rule 1.6(c).) So what are reasonable efforts when it comes to your clients’ information stored on your computer? You have to make an effort, obviously. But how much effort […]

Hand of businessman on dark background with security glowing sign

How To Encrypt Microsoft Word Documents

One easy way to ensure a document remains safe is to add a password to it in Microsoft Word. Here's how to do it on a Windows machine and on a Mac.

Student studying math on the blackboard full of formulas

The Calculus of Risk, Tech Competence Edition

Rule 1.6(c)'s "reasonable efforts" is a duty of care. So let’s see how the calculus of risk plays out when we apply it to computer security.

Vacuum cleaner on a carpet with an extra clean strip

How To Securely Wipe a Hard Drive

Before you sell, give away, or throw out a computer, you need to wipe its hard drive clean.

Padlock and personal information with copyspace.

Russian Hackers Are Trading Your Email Credentials like Magic Cards

Another day, another security breach. Alex Holden, chief information security officer at Hold Security, discovered that 272 million emails are currently being traded in Russia’s criminal underworld. Nearly every major email provider was breached, including Google, Yahoo, and Microsoft. If you route your email through any of the providers mentioned, here are five steps you can take to […]

shutterstock_169047887

URL Shorteners Are Attractive, Convenient, and a Security Risk

Those services that automatically shorten unwieldy and lengthy web addresses are great. They allow you to send something that is a few characters long rather than some mess that spans three full lines. Unfortunately, at least some of them can be compromised to reveal personal information. Worse still, they could create an easy pathway to […]

shutterstock_337214537

Briefs: Uninstall QuickTime ASAP, Apple Trolls the DOJ, Etc.

Get Rid of QuickTime Now if You Are a Windows User You probably have not even been paying attention as to whether you still have QuickTime on your Windows machine, because Apple hasn’t issued a major Windows QuickTime release since 2005, which is one million years ago in internet time. In January, Apple stopped supporting QuickTime […]

shutterstock_386455633

The Anti-Climactic End to Apple v. DOJ

After all the public rhetoric, Constitutional discussion and intense scrutiny, the Department of Justice ended without fanfare the fight to compel Apple to assist in unlocking the iPhone used by San Bernadino terrorist Syed Rizwan Farook. On March 29, 2016, the DOJ filed a status report  in the US District Court which simply stated: The […]

shutterstock_258823979

Briefs: Casemaker Will Fight Fastcase, Employees Will Sell Your Passwords, and Chatbots Will Become Racist, Etc.

Casemaker Is Going to Fight the Fastcase Lawsuit After All A couple months ago, Casemaker declared that they were the sole publisher of Georgia laws, which is…not how the law works, as statutory codes cannot be copyrighted. Fastcase promptly sued. Although Casemaker initially (and wisely) said they would not fight the lawsuit, they have since […]