security

Padlock and personal information with copyspace.

Russian Hackers Are Trading Your Email Credentials like Magic Cards

Another day, another security breach. Alex Holden, chief information security officer at Hold Security, discovered that 272 million emails are currently being traded in Russia’s criminal underworld. Nearly every major email provider was breached, including Google, Yahoo, and Microsoft. If you route your email through any of the providers mentioned, here are five steps you can take to […]

shutterstock_169047887

URL Shorteners Are Attractive, Convenient, and a Security Risk

Those services that automatically shorten unwieldy and lengthy web addresses are great. They allow you to send something that is a few characters long rather than some mess that spans three full lines. Unfortunately, at least some of them can be compromised to reveal personal information. Worse still, they could create an easy pathway to […]

shutterstock_337214537

Briefs: Uninstall QuickTime ASAP, Apple Trolls the DOJ, Etc.

Get Rid of QuickTime Now if You Are a Windows User You probably have not even been paying attention as to whether you still have QuickTime on your Windows machine, because Apple hasn’t issued a major Windows QuickTime release since 2005, which is one million years ago in internet time. In January, Apple stopped supporting QuickTime […]

shutterstock_386455633

The Anti-Climactic End to Apple v. DOJ

After all the public rhetoric, Constitutional discussion and intense scrutiny, the Department of Justice ended without fanfare the fight to compel Apple to assist in unlocking the iPhone used by San Bernadino terrorist Syed Rizwan Farook. On March 29, 2016, the DOJ filed a status report  in the US District Court which simply stated: The […]

shutterstock_258823979

Briefs: Casemaker Will Fight Fastcase, Employees Will Sell Your Passwords, and Chatbots Will Become Racist, Etc.

Casemaker Is Going to Fight the Fastcase Lawsuit After All A couple months ago, Casemaker declared that they were the sole publisher of Georgia laws, which is…not how the law works, as statutory codes cannot be copyrighted. Fastcase promptly sued. Although Casemaker initially (and wisely) said they would not fight the lawsuit, they have since […]

podcast-logo-post-image

Podcast #57: Apple vs. the FBI, with Megan Zavieh

Megan Zavieh explains what's at stake in the FBI's quest to force Apple to build a backdoor to the iPhone. But first, a good story about social media and the law.

shutterstock_289929272

Why Lawyers Need to Stand By Apple

Apple is in the news for the unprecedented order issued by a Federal Magistrate Judge in California this week. The order compels Apple to assist the government in hacking into a terrorist’s phone. Apple publicly refuses to comply, and every one of us ought to be standing by Apple and supporting its decision. What Apple is […]

shutterstock_127259411

Ransomware Hackers Hit Law Firm, Demand Bitcoin, Get Paid

In case you thought data security for your law firm was a fringe issue, a Florida law firm just paid hackers $2,500 in Bitcoin to ransom back their data. The hackers managed to hold all the law firm’s data hostage, and demanded the Bitcoin (Bitcoins?) in exchange for the key to get it all back. The […]

google-security-checkup

Get Free Storage When You Check Your Google Security Settings

It’s Safer Internet Day (apparentlyt) and Google is once again offering 2GB of extra Google Drive storage as incentive to do its free security checkup. The checkup itself is stuff you should check regularly anyway, so the extra Google Drive storage is just a nice perk. Unfortunately, this is only for personal Google accounts, which […]

lcca_logo

Legal Cloud Computing Association Releases Security Standards

How do you know whether your cloud software is sufficiently secure to meet your obligation to protect your clients’ information? Right now, there is no easy answer. You just have to educate yourself and then make up your own mind. That could change as a result of the draft security standards that the Legal Cloud […]

shutterstock_313805942

The Lawyers’ Guide to Hacking Threats

As quickly as we build new technology to keep criminals out, hackers are working around the clock, and using sophisticated tools like Darkode, to climb your security walls. Prevent these attacks with a

shutterstock_155428856

Find Out Where Two-Factor Authentication is Available

You should be using two-factor authentication with your critical online accounts. It is one of the four steps we recommend taking in our security guide, because it is an easy way to drastically increase security. Two-factor authentication means using something you know (your password) and something you have (usually your phone, which most people keep […]

podcast-logo-post-image

Podcast #48: Law Firm Data Security, with Sharon Nelson and John Simek

On today's podcast, we ask security experts Sharon Nelson and John Simek things like how hard is it, really, to hack into someone's email? And what's the greatest security threat for lawyers? Plus, our favorite posts and podcasts of 2015.

shutterstock_256422460

Briefs: Practice Panther Raises $3.5M, Enter Zola, Ghost Data, Etc.

Practice Panther just announced it has raised $3.5 million, and the already-affordable ($29/month/user, paid annually) software is free through the end of 2016 so the developers can collect feature requests to build out the roadmap. If you want to help build practice management software according to your own preferences, you might want to give it a […]

securityprecautionstaken

70% of Lawyers Think Words Make Email Safe, Are Incompetent

If you think a confidentiality statement in your email counts as a precaution when you are sending confidential information, you are incompetent.