The Hottest Topics for the Hottest Topics for Bar Leaders

Size: px
Start display at page:

Download "The Hottest Topics for the Hottest Topics for Bar Leaders"

Transcription

1 The Hottest Topics for the Hottest Topics for Bar Leaders Toronto NCBP Meeting, August 2011

2 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

3 Don t give me no SAAS Software As A Service = Cloud Computing

4 Don t give me no SAAS Cloud Computing Letting someone else Outside of your office Run your programs and keep your data In the cloud But, do you know where in the cloud your data is kept??

5 Don t give me no SAAS The ABA 20/20 Commission is proposing changes to Model Rule 1.1 on a lawyer s duty to maintain confidentiality in electronic communications

6 Don t give me no SAAS Does your Bar use cloud computing? Does your firm use cloud computing?

7 Don t give me no SAAS Do you use cloud computing? In your personal (not business) life? Do you ever send s from your personal address? Do you back up your personal computer to the cloud? Does that back-up include any office stuff you re using on your home computer?

8 Don t give me no SAAS Do you use cloud computing? In your personal (not business) life? Do you ever send s from your personal address? Do you back up your personal computer to the cloud? Does that back-up include any office stuff you re using on your home computer? Do your kids ever: Use your home computer? Of course they do! Do you know What they are backing up to the cloud? Whether what they are backing up might include some of your business stuff?

9 Don t give me no SAAS What about the offsite backups for your firm and your Bar Association? Are those backups kept in the cloud? How safe is the cloud anyway?

10 Don t give me no SAAS Is any of the data stored outside of the U.S.? Do you know? If so, how do you deal with cross-border issues? Toronto bills itself as Canada s Cloud Computing Capital

11 Don t give me no SAAS A few hours drive from Toronto is the town of Waterloo. It is the heart of Canada s Technology Triangle. This is where RIM/Blackberry headquarters are located

12 Don t give me no SAAS Do you have: A negotiated terms of service contract with your cloud or backup provider? Knowledge of and contractual limitations on storage of data outside of U.S.? Other key contractual provisions to protect clients confidences?

13 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

14 What is that hacking C.O.U.G.H.? I am talking about Could Our Usage Get Hacked?

15 What is that hacking C.O.U.G.H.? Do you know if you have been hacked? The FBI has issued a warning to law firms about hacks. 10%= Estimated number of law firms that have been hacked Many don t know that they ve been hacked!

16 What is that hacking C.O.U.G.H.? The Secret Service reports that 63% of data breaches in 2011 occurred in companies of <100 employees Reported in a front-page story in the July 21, 2011 Wall Street Journal

17 What is that hacking C.O.U.G.H.? Do you use encryption software? Do you get express permission from clients to communicate through ? Do you advise clients that your system may not be secure if it is not encrypted? Do you communicate by unsecured Texting? Non-Office ? Like Gmail?

18 What is that hacking C.O.U.G.H.? Have you checked your office computer for hacks? Have you checked your Bar s computer for hacks?

19 What is that hacking C.O.U.G.H.? If there was an ethical complaint filed because of a data breach at a law firm, wouldn t it be reasonable to assume that the first question might be When was the last time you checked your system to see if it was hacked?

20 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

21 Flying without wires Have you ever heard of: War Chalking War Driving

22 Flying without wires What is this? It s a way of finding open wireless networks. For example, have you used a wireless network on this trip? Do you know whether the security it employs is: WPA WEP WPA2

23 Flying without wires WEP Wired Equivalent Privacy WPA Wireless Protected Access WPA2 a second, newer version of Wireless Protected Access Does any of this mean anything to you? If not, do you know whether what you re doing can be accessed by others?

24 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

25 High Jinx or Hijacked? This is all about Security on your mobile media Laptops Cell phones Smart phones I-Pads

26 High Jinx or Hijacked? What if someone steals your Laptop? Smart phone? I-Pad?

27 High Jinx or Hijacked? How secure is your device? Can your office: Remotely turn off the device? Remotely track the device?

28 High Jinx or Hijacked? How secure is your data? How long is your password?

29 High Jinx or Hijacked? An 8-character password can be cracked in 2 hours However, to crack a 12- character password Takes 15 years!

30 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

31 Watch Where You Jump We can t avoid technology issues. We have to jump in and master this area for ourselves, our law firms, and our Bar Associations.

32 Watch Where You Jump Jumping into anything requires a serious and brave commitment. Helping your members master technology issues, and protect themselves from unintentional liability, requires a serious and brave commitment from your Bar.

33 Watch Where You Jump We don t have the option of not jumping into technology issues. We know that these issues are critical to every member of our Bar. We know that if we are not fully knowledgeable about these issues, then our members face serious problems. We all must jump into educating our members about this at every opportunity.

34 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that hacking C.O.U.G.H.? 3. Flying without wires. 4. High Jinx or Highjacked? 5. Watch Where You Jump 6. Be Flexible!

35 Be Flexible! Bar Associations must be flexible in meeting the changing technology issues that face all of us.

36 Be Flexible! Bar Associations must be flexible in finding ways to inform our members of these technology issues in a meaningful manner.

37 These issues affect everything we do. Also, Be Flexible! What happens to private data when the owner dies? Songs on ITunes? Facebook, Twitter, and s? Financial Info on the Web? Bank Accounts, PayPal, Brokerage Accounts? How we run our firms How we run our associations How we interact with clients Practice issues Ethics issues Professionalism issues Avoiding malpractice claims

38 The Hottest Topics for the Hottest Topics for Bar Leaders Toronto NCBP Meeting, August 2011

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs Small Business Cybersecurity Dos and Don ts September 25, 2015 Dover Downs Helping Businesses Grow and Succeed For Over 30 Years Statistics 2 Results from the Cybersecurity Readiness Survey 25% of Respondents

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches

The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches by Sharon D. Nelson, Esq. and John W. Simek 2011 Sensei Enterprises, Inc. Another day, another data breach. Data

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

Setting Up Your Wireless Network

Setting Up Your Wireless Network Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Have you ever accessed

Have you ever accessed HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

Ethical Considerations for Lawyers Using the Cloud

Ethical Considerations for Lawyers Using the Cloud Ethical Considerations for Lawyers Using the Cloud Presentation by Peter J. Guffin, Esq. Pierce Atwood LLP pguffin@pierceatwood.com (207) 791-1199 Maine State Bar Association Summer Meeting June 22, 2012

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer

Digital Security. Dr. Gavin W. Manes, Chief Executive Officer Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI

More information

The Cloud On A Clear Day. Neal Juern

The Cloud On A Clear Day. Neal Juern The Cloud On A Clear Day Neal Juern Alternate Titles The Cloud So what is it anyway? Why is it so cloudy? How To Keep Your Head Out What are the risks? Is it all just marketing fluff? What is The Cloud?

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,

More information

HOW TO PROTECT YOUR DATA

HOW TO PROTECT YOUR DATA HOW TO PROTECT YOUR DATA INTRODUCTION Every day in the news, we hear about data breaches. Are you concerned your sensitive business, customer and supplier data is not protected? Do you have a secret sauce

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

Securing Your Wireless Network

Securing Your Wireless Network Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

LAWYER TO LAWYER MENTORING PROGRAM INTRODUCTION TO MALPRACTICE AND GRIEVANCE TRAPS

LAWYER TO LAWYER MENTORING PROGRAM INTRODUCTION TO MALPRACTICE AND GRIEVANCE TRAPS ! LAWYER TO LAWYER MENTORING PROGRAM INTRODUCTION TO MALPRACTICE AND GRIEVANCE TRAPS The following is intended to facilitate a discussion about common malpractice and grievance traps and how to recognize

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

Executive Summary Key Findings

Executive Summary Key Findings Executive Summary Key Findings What does online life look like for the average young Canadian? First and foremost, these are highly connected children and teens, most of who are accustomed to online access

More information

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About Kelly H Twigger, Esq. Oil and Gas Symposium Arkansas Law Review October 16-17, 2014 Overview In the last two decades, business

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard The Impact of Wireless LAN Technology on to the PCI Data Security Standard 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs and PCI Retailers today use computers

More information

www.mission-computers.com www.street-smarts.ca 1

www.mission-computers.com www.street-smarts.ca 1 Hosted by Spruce Grove & District Chamber of Commerce Passwords Protecting yourself & your business Phishing scams Connie Clark, Mission Computers Dannielle Street, Street Smarts Marketing www.street-smarts.ca

More information

Personal Safety Tips For Public Information Technology

Personal Safety Tips For Public Information Technology IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

Why is it important?

Why is it important? Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone

More information

How to use the Cloud

How to use the Cloud How to use the Cloud Intro You may have heard advertisements, articles, or tech savvy people talk about the cloud and didn t know what that meant. Have no fear, we re here to teach you. Sometimes the cloud

More information

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

PROFESSIONAL COUNSEL. Safe and Secure: Cyber Security Practices for Law Firms A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS

PROFESSIONAL COUNSEL. Safe and Secure: Cyber Security Practices for Law Firms A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS PROFESSIONAL COUNSEL SM ADVICE AND INSIGHT INTO THE PRACTICE OF LAW Safe and Secure: Cyber Security Practices for Law Firms A CNA PROFESSIONAL COUNSEL GUIDE FOR LAWYERS AND LAW FIRMS Due to the unprecedented

More information

Medicaid Enterprise Systems Conference 2012

Medicaid Enterprise Systems Conference 2012 Medicaid Enterprise Systems Conference 2012 Best Practices for Using HIT and HIEs to Keep PHI Secure in an Increasingly Mobile and Technical World Presenters: Charles Sutton, Senior Executive Health Product

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

THE TOP LEGAL TECHNOLOGIES

THE TOP LEGAL TECHNOLOGIES THE TOP LEGAL TECHNOLOGIES Ellen Freedman, CLM Law Practice Management Coordinator Pennsylvania Bar Association THE TOP LEGAL TECHNOLOGIES Table of Contents 1. Speaker biography 2. PowerPoint presentation

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

WLAN Security Networking with Confidence

WLAN Security Networking with Confidence WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client

More information

Information Security Policy and Processes SEC/2011/2/0317. Rachel Fligelstone

Information Security Policy and Processes SEC/2011/2/0317. Rachel Fligelstone Policy Coversheet Policy Title: Information Security Policy and Processes Policy reference number: Committee/ Office- assigned reference number: (if applicable) Name of Committee/ Office which approved

More information

Technology And Anarchism. Anonymous

Technology And Anarchism. Anonymous Technology And Anarchism Anonymous 2009 Contents This is more than security culture................................ 3 What this means for modern anarchists............................. 3 A serious Security

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail

More information

Acceptable Use of Computing and Information Technology Resources

Acceptable Use of Computing and Information Technology Resources Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Legal Technology: Cloud Computing for Lawyers

Legal Technology: Cloud Computing for Lawyers Legal Technology: Cloud Computing for Lawyers Presented by: Nicole Black Author Cloud Computing for Lawyers Co-author Social Media for Lawyers--The Next Frontier Legal Technology Evangelist MyCase.com

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Is Cloud Computing Inevitable for Lawyers?

Is Cloud Computing Inevitable for Lawyers? Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be

More information

TECHNOLOGY & CLOUD SERVICES

TECHNOLOGY & CLOUD SERVICES General Counsel Services Internet & Online Business Transactions Strategic Transactions & Capital Financings Technology & Cloud Services Start-Ups & Emerging Companies TECHNOLOGY & CLOUD SERVICES WHEN

More information

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc. Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Protect. Manage. Organize. Three Steps to a More Secure Digital Life

Protect. Manage. Organize. Three Steps to a More Secure Digital Life Protect. Manage. Organize. Three Steps to a More Secure Digital Life As you move more of your information online, here s how you can safeguard your assets, preserve your good name, and assist your family.

More information

Thinking Cloud Services Look Before You Leap

Thinking Cloud Services Look Before You Leap Thinking Cloud Services Look Before You Leap Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Friday, March 16, 2012 Session 10358 Preamble Cloud security literature consistently boils

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

( and how to fix them )

( and how to fix them ) THE 5 BIGGEST MISTAKES LAWYERS MAKE WHEN CHOOSING A CLOUD SERVICE PROVIDER ( and how to fix them ) In recent years, an increasingly large number of law firms have moved their software and data to the cloud.

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

BSHSI Security Awareness Training

BSHSI Security Awareness Training BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement

More information

Question How do I access the router s web-based setup page? Answer

Question How do I access the router s web-based setup page? Answer http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

Anatomy of a Cloud Computing Data Breach

Anatomy of a Cloud Computing Data Breach Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

10 Hidden IT Risks That Threaten Your Practice

10 Hidden IT Risks That Threaten Your Practice (Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Integrated Communications

Integrated Communications Integrated Communications Whitepaper: 11 Secrets to Drastically Reducing Your Telecom Costs Integrated Communications, Inc In today s competitive business environment, every penny counts. Smart businesses

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

BYOD: BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of

More information

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com

More information

MANAGING YOUR DIGITAL LEGACY

MANAGING YOUR DIGITAL LEGACY MANAGING YOUR DIGITAL LEGACY Keeping Track of Important Digital Assets and Accounts A guide by safelyfiled It used to be that you only had to consider leaving behind physical items and intangible assets

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast

THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

PRIVATE WiFi TM Reviewer s Guide

PRIVATE WiFi TM Reviewer s Guide PRIVATE WiFi TM Reviewer s Guide Published Jan 2013 Table of Contents 1. Introduction to PRIVATE WiFi TM 3 1.1 About Private Communications Corporation... 3 1.2 About the CEO... 4 2. Market Need 5 2.1

More information

OCR/HHS HIPAA/HITECH Audit Preparation

OCR/HHS HIPAA/HITECH Audit Preparation OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education

More information

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding

More information

Catalog Month 20XX Living Space Smart Home. Guide Sublinefor network security in building systems control

Catalog Month 20XX Living Space Smart Home. Guide Sublinefor network security in building systems control Catalog Month 20XX Living Space Smart Home Smart Headline Home. Guide Sublinefor network security in building systems control Smart Home. The entire house under control. Totally practical for everyday

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF

The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research

More information

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA You can secure your wireless connection using one of the methods

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Reach for the sky NEW SMAR T RELIABLEFAST RELIABLESHARE SOLUTION ACCESS CONNECT TEAMCONNECT SURF

Reach for the sky NEW SMAR T RELIABLEFAST RELIABLESHARE SOLUTION ACCESS CONNECT TEAMCONNECT SURF REAY REAY Reach for the sky with Cloud Services Rogers Know-How Guide to Cloud Services & Your Business. SECURE SMAR T TOOLS SECURE EXT REAY Reach for the Sky with Cloud Services... 01 The History and

More information

Is Cloud Accounting Right for Your Business? An Educational Report

Is Cloud Accounting Right for Your Business? An Educational Report Is Cloud Accounting Right for Your Business? An Educational Report One of the most exciting changes in the accounting industry is cloud accounting. The concept is easy to grasp: cloud accounting simply

More information