Block on Trump's Asylum Ban Upheld by Supreme Court
Yesterday, we put in our two cents about the recent hacking of America's BigLaw firms by Russian hacker, Oleras. Hopefully you weren't one of the many firms on that list. But if you're feeling a little more secure in your firm's network because you're a solo lawyer, don't. Hackers are after your discovery.
We've reviewed some security suggestions that came up at the recent 2016 ABA TechShow. Follow these steps to safeguard your firm's sensitive information.
Everyone knows it's way too easy to become lax -- not just in security measures, but in everything. Laziness is your enemy. According to Adriana Linares, one of the tech consultants at the ABA TechShow conference, 80 percent of law firms have been hacked, while the other 20 percent are lying or don't know about being hacked.
Get used to sending and receiving emails at a slower rate. If you use two factor authentication, your email accounts will be protected much better against unwanted intruders than it probably is now. Linares conceded that 2FA can be a pain in the neck, but like a lot of things, people get used to it. Make 2FA a thing you get used to.
I used to have a composition book full of passwords of my accounts. No more. A better option is to use a password manager like LastPass. For ultimate backup, keep a physical sheet in your bank's deposit box. Update that monthly.
You should be backing up your client files frequently. Fortunately, faster drives that are solid state are making data transfer less painful, but it's still a bit of a chore. Treat that drive like you would your child.
Also, encrypt your child. Better yet, buy your child pre-encrypted.
More and more people are realizing that encryption should be the standard of how they operate. For a while, Phil Zimmerman's Pretty Good Privacy (PGP) was the standard reliable encryption paradigm, but it trades convenience for security. That's what makes it "pretty good."
Alternatively, loosen up a little and use the open-source apps that allow for encrypted instant messaging and voice calling. If you're an iPhone user, FaceTime and iMessage supports end-to-end encryption which means that third parties can't intercept your messages while they're going from device to device. The problem is, however, is that the government can now use NAND mirroring (we think, anyway) to get into your 5C or below iPhone. Care to update?
Don't be lulled into the notion of "hackers only go after the big guys." Not anymore. At the very least, taking your first few steps towards more security of your files will make you feel better. These steps are simple. Block out a weekend soon and get cracking.
FindLaw has an affiliate relationship with Indeed, earning a small amount of money each time someone uses Indeed's services via FindLaw. FindLaw receives no compensation in exchange for editorial coverage.
Meeting with a lawyer can help you understand your options and how to best protect your rights. Visit our attorney directory to find a lawyer near you who can help.
Sign into your Legal Forms and Services account to manage your estate planning documents.Sign In
Create an account allows to take advantage of these benefits: