Civil Rights
Block on Trump's Asylum Ban Upheld by Supreme Court
When it comes to stealing valuable information, lawyers are easy targets. We handle sensitive personal and financial information, we hang on to immense amounts of data, and we're not always the most technologically sophisticated. So it's no surprise that hackers are going after law firms more than ever before.
Thankfully, there are ways to protect yourself from hackers. To help you avoid a potentially devastating cyberattack, here are FindLaw's top eight posts to help you ensure your cybersecurity.
If you handle confidential information on the go -- and we all do these days, now that smart phones and tablets let us keep our office in our pocket -- you'll want to make sure your information is protected. Here's how.
Should your firm institute mandatory I.T. security training? Of course. Here's why.
If you're checking your email from the airport, sending a file from a Starbucks, or streaming movies in your hotel room, you're probably using a shared wireless network. Here are some ways to make sure that you're secure.
When you're traveling abroad -- and not just to China -- you'll want to take extra precautions to make sure you're not putting client information at risk.
Email isn't the world's most secure communication system, but there are steps you can take to prevent the disclosure of client information, from making sure emails are encrypted, to using communication portals for sensitive information.
Cloud computing is becoming increasingly popular among attorneys, with almost a third of attorneys using cloud services for legal tasks. But, anytime you put something on "the cloud," you're putting it in someone else's hands. So make sure they're following industry standards.
A new information sharing and analysis center is making it easier to stay on top of cybersecurity threats facing the legal industry, allowing you to prepare before you're put at risk.
You can't avoid every cybersecurity threat. But cyber insurance policies can help mitigate the risks, should you fall victim to an attack.
Related Resources: