Anyone who uses email is vulnerable to Phishing, Spear Phishing, Malware, Impersonation Email, Unsafe Links and Attachments, and more. Microsoft has a product called Advanced Threat Protection ATP to protect your email and PC’s from these threats.Advanced Threat Protection ATP Capabilities ...
A Cybersecurity Policy is an important document to write and implement for your firm, regardless if you are a solo practitioner, a five-person office or a thirty-person firm. It is one of the components for Cybersecurity Insurance and corporate clients now request copies of their outside counsel ...
Happy New Year! I am not accustomed to writing and typing 2017, yet here it is, 2018! As a technical consultant and owner of a Computer Networking & IT Solutions firm, I spend a great deal of time thinking about small to medium sized business IT technologies and solutions. I also spend a g ...
During the most recent WannaCry ransomware cyberattack, millions of computer systems throughout the world were infected. The national and local news highlighted some of the large institutions worldwide that came to a grinding halt because they had so many computers on their computer network infect ...
Email phishing is nothing new, however it continues to be one of the most significant problems for organizations and individuals alike. According to a report by Jordan Robertson at Bloomberg Technology, “86 percent of world’s emails are spam”. These unwanted emails can cause clutter, confusion ...
Have you ever received a call from someone impersonating a Microsoft tech support representative or a pop-up window on your computer while browsing on the internet that instructs you to call Microsoft or some other technical support company? Many people, including law office attorneys and staf ...
Over the past few years, reports about hackers and security breaches have gone from very few to many times per month. The reports range from hackers breaching a firm’s security to a malicious virus that renders a firm’s network inoperable. Most recently, a law firm in Panama was hack ...
Most attorneys have become inundated with emails from clients, opposing counsel, and the courts. Additionally, with the proliferation of smartphones, the same can be said for text messages. Clients and counsel are now using emails and texts as their chief method of communicating. E ...
Three new domain name extensions have been approved by ICANN (Internet Corporation for Assigned Names and Numbers); .law, .lawyer, .attorney. These new extensions for law can only be registered by a certified attorney with a domain name registrant, such as, Register.com, Godaddy.com, etc.Firms tha ...
Sage Software held its annual conference, “Sage Summit”, in late July 2015. Alicia Slade and Leslie Hennessy attended the conference, including a full-day of seminars and training on Sage Timeslips. In addition to the privilege of getting to hear General Colin Powell speak at the keynote add ...