Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, says a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to be roughly as secure as iloveyou88; one said "both are a combination of dictionary words and are appended by … [Read more...] about How secure is your password? Are you sure?
Technology
San Diego firm gets more cash faster with easy-to-use online credit card payment system
It can be pretty daunting to introduce a new feature on your website, especially one that involves financial transactions. But when it came time to update the website for San Diego law firm Marks, Finch, Thornton & Baird, LLP, and start offering clients the ability to pay their bills online, the only thing that really caught firm administrator Linda Quindt off-guard was how … [Read more...] about San Diego firm gets more cash faster with easy-to-use online credit card payment system
Busting 7 common information security myths
Commonly held myths about information security can lead to a potential data breach and ultimately have a big impact on a company's bottom line and reputation. However, these breaches can be avoided when businesses provide their employees with the right training and tools to separate fact from fiction and responsibly manage confidential information. A recent study shows that 23 … [Read more...] about Busting 7 common information security myths
Information Security Checklist for Small Businesses
Why you need this checklist: This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address. How this checklist helps you: This checklist will help you pinpoint your cybersecurity policy's strengths and weaknesses. How to use this checklist: Print off this checklist and review it with members of your cybersecurity … [Read more...] about Information Security Checklist for Small Businesses
Cyberthreats demand your attention and a customized approach
The recently released BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyberthreats and to have enterprisewide tactics in place to address intrusions before they happen. At the same time, Dell just released the … [Read more...] about Cyberthreats demand your attention and a customized approach
Keep your firm and yourself cyber safe with some digital spring cleaning
The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) are encouraging consumers to get their online lives in good order by conducting a thorough cleanse of their cyber clutter and make "digital spring cleaning" an annual ritual to help protect valuable personal data. A NCSA survey found that preventing identity theft is a top safety concern for Americans, … [Read more...] about Keep your firm and yourself cyber safe with some digital spring cleaning
Making the case for case management software
By Elizabeth M. Miller, MBA bio Time management and organization are two of the key components to efficiency and thus, profitability. The value of organized systems in place to gather and store key data pertaining to client files and other important information cannot be overlooked. The answer to the dilemma of storing all data relating to every client file is the … [Read more...] about Making the case for case management software
Data analytics and the legal profession
The Coalition of Technology Resources for Lawyers (CTRL), an open source community for legal practitioners, has released the results from its annual Advanced Analytics Research, revealing an uptick in analytics usage by in-house legal departments. "We are excited to present our annual research demonstrating the use and proliferation of advanced analytics in the legal … [Read more...] about Data analytics and the legal profession
Data breaches becoming more complex, pervasive, and damaging
Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves a lingering, if not lasting imprint on an enterprise, finds Verizon's 2017 Data Breach Digest. As we found in the Verizon 2016 Data Breach Investigations Report (DBIR), the human element is again front … [Read more...] about Data breaches becoming more complex, pervasive, and damaging
January 26 is Data Privacy Day. Learn how to safeguard your data
Do your employees how their information is collected, used, and stored by the devices, apps, and websites they use every day? According to a recent Pew Research Center study, 91 percent of American adults "agree" or "strongly agree" that consumers have lost control of how personal information is collected and used by companies. Additionally, 50 percent are worried about the … [Read more...] about January 26 is Data Privacy Day. Learn how to safeguard your data