How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning
|
|
- Meryl Bradley
- 8 years ago
- Views:
Transcription
1 How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning By Jim Calloway Publisher: Jim Calloway s Law Practice Tips at Digital Disaster stories are becoming more and more common. It seems like everyone has heard a story of a recent hard drive crash or a power surge that ruined some equipment. Generally speaking, there are two broad approaches to avoid the impact of a digital disaster on your business. Both of these approaches must be followed religiously to protect the law firm data. The first of those areas is to have appropriate and adequate data backup and storage procedures. The second of these areas is to employ technology tools and office policies that protect your office network from unnecessary risks
2 Let s discuss backup first. Backup is extremely important and the number of firms that fail to do backup adequately is still shocking. Let s look at a few statistics. Company Bankruptcy - 93% of companies that lost their data for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. (National Archives & Records Administration in Washington) Tape backup Failure - 34% of companies fail to test their tape backups, and of those that do, 77% have found tape back-up failures. (The Gartner Group) Theft - A laptop is stolen every 53 seconds (FBI) Some might be surprised at the different causes for losses of data. Here s a breakdown. Hopefully, the case for backing up is irrefutable. So the question is what method to use. Backup tapes are an outdated technology. While large firms with dedicated IT departments may still appropriately use tape backup processes, solo or small firms lawyer who are doing their own backup should no longer be using tapes. Backup tapes are unreliable, more expensive, increasingly harder to find and are more difficult to restore than backups created using a portable hard drive. The image at the right is a Western Digital - My Passport Essential SE 1TB External USB 2.0 Portable Hard Drive. For those who are not familiar with the term TB, it stands for terabyte. A terabyte equals 1024 Gigabytes. This drive plugs into a computer s USB port. It comes with pre-installed software to first backup an entire hard drive
3 and then regularly backup any new or changed files on a schedule that you specify. It also provides password protection and encryption. The cost for this device with its huge amount of storage, coupled with all the software you need preinstalled is $ at the local Best Buy when I last checked. There are less expensive models with the same preinstalled software and less storage capacity. There are a few other considerations for valuable law office data. But if you haven t been backing up all of those family photos and itunes music purchases on the home computer, maybe you need to stop at a Best Buy on the way home and protect the important family digital data now. For the law office computer network, a more complete data backup is required. (Although if you haven t done a backup in weeks, do this on the way home and you ll be in better shape in the morning than you are now backup wise.) Surely every lawyer can appreciate the consequences of the loss of all the word processing forms and all of the billing records without even going into , contacts, calendar entries and other important information on the office network. The careful lawyer will have at least two, and more likely three or more, separate data backup processes. Storing a fairly current backup outside of the office is critical in case the office is hit by fire or flood. (Speaking of flooding, it is important that computers and servers are not stored on the floor in case of minor flooding or water from firefighters. A five or six inch high stand for every computer may save you tons of aggravation some day in the future.) Offsite backup can be accomplished in many ways. One could buy several of the portable hard drives and rotate them outside of the office. (Although data security experts recommend that remote data storage is at least 100 miles from the office.) Other law firms will utilize automated remote backup services. Some will make use of manual uploads to document repositories. Once you have a good backup plan in operation, you need to conduct test restores. A backup is only good if you know how to restore the backed-up data. Every lawyer, no matter how technically ignorant otherwise, must know how to restore from the backup. It may be their brief that needs to be covered today and no one may be available to help them. One should not discount the idea of spot backups as well. One might copy forms or an Outlook PST file to a thumb drive, just to have another copy. If one has been
4 working on a brief for several hours, ing a copy to your Gmail account or copying it to a thumb drive is a good backup plan. Cloud computing practice management solutions are a relatively new concept that include backup as a part of the service but create other data security concerns for many lawyers. To paraphrase the old cliché, one can never have too much money, be too thin or have too many backups. It should also be noted that the more a law firm has gone paperless with digital client files, the more a backup will have the effect of restoring the entire law practice in the event of physical office destruction. See my article The Paperless Office as a Risk Management Enterprise at Disaster Plans In addition to a backup plan, a written general disaster recovery plan is required. Each law firm, whether a solo lawyer or a larger firm, needs to create a backup plan and put it both in writing and into practice. It must be protection prioritized. This means protect the people first then protect the business assets. Recovery tends to work in the same order. First, a mechanism for locating and contacting people (employees, clients, courts) and then mechanisms for protecting the business s assets and ability to continue to operate and meet its legal and financial obligations. What is the Essential Core of Your Practice that absolutely, positively must remain operational? Review the potential disasters and what your responses would be to each. Draft Your Plan write it not only in plain English but also to be understandable by panicked, stressed out people who have just experienced a disaster! Diversify your Options in other words, have backup plans for your backup plans (anticipate Murphy s Law and don t put all your disaster recovery eggs in one basket!) Plan for Failure not unlike advising a client to always plan for litigation build redundancy into your technology systems fully expecting digital disasters to hit Fire Drills you have to take your plan seriously and conduct straight-faced tests on a regular basis
5 The American Bar Association provides disaster recovery information and links at and Internet Security Passwords Strong passwords are a critical security concept. Many lawyers use passwords and password recovery options that are not adequate. More of you should consider strong password managers, like Roboform ( or LastPass ( with an installation of the product on a secure flash drive. Sarah Palin s Yahoo account was hacked by someone doing some online research and figuring out her Yahoo password recovery question and answer might be where did you meet your true love? with the answer being the name of her high school. So how long do you think it would take someone to search online obituaries and figure out your mother s maiden name? It is strongly suggested that you make up a fictitious mother s maiden name like BX345!! and use it for your security question answer to that question. If you use weak passwords than nothing is secure. But most of us cannot remember passwords if they are strong enough to be secure. A password cannot be any word that might appear in a dictionary. Restore Points Another important security issue is learning how to set Restore Points and use them effectively. This is a powerful tool that many users simply ignore. No matter how secure your defenses, it is likely that your computer will get fouled up at some time whether from spyware or other malware or just the installation of a new application that conflicts with something on your computer. It is a real time-saver just to be able to set the computer back to the settings from yesterday or a few hours ago. Microsoft provides tutorials for restore points. Here are some links to some sources of information. Windows XP System Restore Guide
6 Windows Vista System Restore Guide How to Create a Restore Point in Windows Firewalls, Anti-Spyware and Antivirus A firewall is your guard to keep the bad things outside of your computer network. The Microsoft firewall actually works quite well. In fact Microsoft s entire suite of security tools work quite well and they are free. It is understandable that many will still wish to rely on third party tools given the history of their superiority and the fact that malware designers would try to build tools that would defeat the widely-used Microsoft tools if possible. Microsoft Security Essentials is a free antivirus and spyware package. Microsoft also has a malware removal tool When I want to purchase a new utility, such as anti-malware tools, I go to the reviews on C Net, PCMag.com and PCWorld.com to see what the current state of effectiveness is at the moment. I d never purchase a Norton anti-malware utility of any kind based on past experiences, but that s just me. This following link is to a chart of malware testing results by the people at Virus Bulletin. They tested software for current malware (reactive) and future malware (proactive) detection. The higher the malware application is on the chart (vertical axis) and the farther to the right (horizontal axis) reflects its effectiveness. This was based on testing in April 2010 and should be valuable for at least the rest of the year. If you ever encounter a computer with really bad malware infection, it may be really hard to repair. Often these are caused by people clicking on what they think are ads for anti-malware and actually approving the installation of malware on their machine under the guise of it being antimalware protection. These insidious infections will actually block one from visiting antimalware sites and downloading help. You can
7 manually delete the infected files, but parts hide in your registry and other places and it keeps coming back. Here s the most effective method I have found short of giving up and reformatting the hard drive: 1) Disconnect the infected computer from the Internet and any network. If it is laptop, disable wireless networking. 2) Go to another computer and download the free version of MalwareBytes Antimalware from to a flash drive. Do not install it. Load the.exe file to the flash drive. 3) Put the flash drive into the infected computer and copy the.exe file to the infected computer. Remove the flash drive immediately. (No sense taking chances on infecting it, even though that is not likely.) 4) Run the file on the infected PC to install MalwareBytes Anti-malware on the infected computer. Turn off all power save, screen saver and go to sleep settings on the infected computer as this may take hours. Run it and see what happens. 5) Consider buying the premium package out of gratitude if it works. (And one day soon you may have to buy the premium package to so this anyway.) Malware Prevention Every six months one should remind office staff and lawyers that they should never, never click on attachments to or links in s unless they are sure of the source. It is OK to telephone someone to ask did you really send me that? Although there are such things as Microsoft Word Macro viruses, it is generally safe to open documents. Files ending with.exe or.htm or.php are particularly suspect and generally not the types of files that a law office would be ed. Whatever firewall or anti-malware solution you employ, make certain it is set for automatic updates and that you pay for your annual fee as soon as you are aware it is due
8 iphones: Too Insecure for Lawyers? My good friends and colleagues, Sharon D. Nelson and John Simek, have taken the lead in criticizing the iphone s lack of security. (Sharon is my teammate on our monthly Digital Edge: Lawyers and Technology podcast.) Their article Why Lawyers Shouldn t Use The iphone: A Security Nightmare bears reading by every lawyer who is contemplating an iphone purchase. You should read that piece in its entirely to appreciate my security tips below. However, I must note that I have read the article several times and I m not giving up my iphone. But I do appreciate that Apple has a poor design in that the passcode is too easy for a pro to bypass. Hopefully if I lose my iphone it won t be found by a pro. IPhone Security Tips 1) Don t lose your iphone. All of security questions about the iphone revolve around what can be done if someone with expertise comes into possession of your iphone. 2) Use a passcode to lock the phone. Yes, it makes the phone a little less easy to use, but it is the equivalent of locking your doors on your office. 3) Set the iphone to automatically wipe its data after ten consecutive incorrect passcode attempts. 4) Consider other remote wiping and lost phone locator options. MobileMe may sound like a good investment to many. It is a $99 per year service from Apple that allows you to track the location of an lost or stolen iphone and to remote wipe all of its data if it is connected online. 5) As soon as possible after losing an iphone, change your passwords on your e- mail, contacts and social networking accounts. 6) Regularly sync the iphone to itunes to back up your apps and data. 7) Consider what data may be carried on your iphone. Some may opt not to have the office on the phone. Others may do periodic wipes of the phone and then restore the settings and apps (but not the data) via itunes. 8) Put your business card in the iphone protective case with Reward offered for return of lost iphone written on the back to help encourage someone to do the right thing
9 9) Don t lose your iphone. Metadata Disclosure Solutions By now, hopefully most all practicing lawyers are aware of the possible dangers of inadvertently disclosing client confidences or other embarrassing material via hidden metadata. A full discussion of metadata is outside of the scope of this discussion, but one can read my blog post, The Mysteries (and Magic) of Metadata at There are many possible solutions to the issue of disclosing metadata. Some combination of the following may work best for your office. Purchasing a metadata scrubber and using it is the best solution. Fax or snail mail rather than . Copy all text (Cntrl +A, Then Cntrl + C) and Paste it into a blank document. Note: This will carry some metadata, but not Track Changes or Deleted Comments. Copy all text (Cntrl +A, Then Cntrl + C) and Paste Special- Unformatted Text into a blank document. Note: You lose the metadata, but the document formatting as well. Every time you send an attachment that you have created or edited, send it out in PDF format (with rare exceptions) My Personal Best Practice Solution Note: PDF files will contain some metadata, but that limited kind is unlikely to cause trouble. This is not practical when you are co-authoring a document with another. With co-counsel, you just need to discuss the issue. With opposing counsel, you may need to use a metadata scrubber. Microsoft Word 2002 Review white paper at but consider upgrading or buying a metadata scrubber. Microsoft Word 2003 (and other MS Office products) Download and install the Remove Hidden Data Tool for Office 2003 and Office XP Microsoft Word 2007 The Remove hidden data tool is built in. No separate download required. (Note: Computer forensics experts tell us the results from the free Microsoft tools listed above are imperfect.) Corel WordPerfect Upgrade to Versions X3 or X4 which have the publish without metadata feature. WP versions 9 and higher have the publish to PDF
10 option built it as well. (WP has less potentially dangerous metadata than Microsoft Word in the first place.) Purchase a third party metadata scrubber and use it. There are many such products, but we direct your attention to the Metadata Assistant from (Direct link to retail version - An Enterprise version for more than 20 workstations available as well.) At a purchase price of $79 per license, this is a tool that most law firm should consider. This will also allow you to view the metadata in other files, not that I can assure you that practice is always ethically permissible
Technology Special Interest Group
Technology Special Interest Group 2014 2015 Schedule Sept: Backing Up Your Data Oct: Archiving 1: Organizing Your Files Nov: Home Networking Dec: Archiving 2: Metadata Jan: Security Feb: Archiving 3: Storage
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationLAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
More informationPC/Tablet/Smartphone Security & Password Managers
PC/Tablet/Smartphone Security & Password Managers What you should do to keep your PC secure. Does the type of PC you use matter? What to do to keep your smartphone secure does the brand matter, why? Tablet
More informationIf you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
More informationIntroduction to Microsoft Small Business Server
Summary The aim of this article is to present some basic information about Small Business Server 2003 and how it can fit in with your business. Topics What is Small Business Server? (also known as SBS)
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationBackup and Recovery Plan For Small Businesses
Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,
More informationIT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
More informationDisaster Recovery Planning Save Your Business
Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack
More informationBacking up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
More informationHow to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
More informationOffsite Backup with Fast Recovery
SMALL BUSINESS ESSENTIAL TECHNOLOGY INTRODUCTION Offsite Backup with Fast Recovery How not to be stranded, pulling your hair out, waiting a couple of weeks for your server to be rebuilt. STOP USING TAPE
More information2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly
More informationThe 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
More informationWhat You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com
More informationLittle-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service
Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationSAFEGUARDING YOUR WINDOWS COMPUTER
SAFEGUARDING YOUR WINDOWS COMPUTER February 2011 www.cybersecurityguy.com 1 SAFEGUARDING YOUR WINDOWS COMPUTER It's important to safeguard your computer to protect your personal information against hackers
More informationIs Cloud Computing Inevitable for Lawyers?
Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationMAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
More informationSecuring Your Technology Infrastructure Five security areas of focus for small to medium businesses.
Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses. Anthony Suda Network Manager marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000
More informationThe following pages describe the installation and configuration process of GPmicro s dinkum Backup Software.
INSTALLATION & CONFIGURATION The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. 1. System Requirements The following minimum system requirements
More informationalways on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department
managed services ebook Meet the Always On IT Department meet the always on it department PROPHET Business Group 1 MEET THE ALWAYS ON IT DEPARTMENT As IT gets more complicated it gets easier for the daily
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More information5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
More informationMobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
More informationDesktop or Laptop Diagnostic $49.99
Desktop or Laptop Diagnostic $49.99 Important: For online service we need a high-speed internet connection and a working computer Expert Troubleshooting $49.99 On-Line, MSD Office On-Site Computer hardware
More informationClickfree C6 Easy Imaging October 24, 2011
HOW LONG WILL THE FIRST BACKUP TAKE? Clickfree Total Computer Backup can take a few hours to complete when first plugged in. Since Clickfree will copy absolutely everything from your computer (including
More informationHow To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses)
The Real Cost of Do-It-Yourself Backups and Why Online Backup is Better This white paper discloses the real costs to a small business for performing proper data backups in-house using portable hard drives,
More informationCloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationIntroduction. Read on and learn some facts about backup and recovery that could protect your small business.
Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records
More informationFiVE FATAL MYTHS ABOUT DATA BACKUP. Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood.
FiVE FATAL MYTHS ABOUT DATA BACKUP Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood. Protect your business before a data loss becomes catastrophic.
More informationWashwood Heath Academy Use by staff of private communication devices policy
As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of
More informationComputer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014
Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology
More informationBACKING UP YOUR PC. Ed Schwartz January 2012
BACKING UP YOUR PC Ed Schwartz January 2012 Why should you back up? Do you have any data that can t be easily recreated? If you PC crashes do you want to be back online in minutes instead of hours? It
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationOutlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.
Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer
More informationJanuary 2016 Issue #2 Windows Backup
January 2016 Issue #2 Windows Backup In the prior issue, I preached the virtues of frequent backups. Well, now it s time to detail the how-to of backups, and we will begin with Windows Backups. Built into
More informationTranscription. Crashplan vs Backblaze. Which service should you pick the short version
Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.
More informationComputer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
More informationFree and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
More informationComputer and Information Security End User Questionnaire
Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/
More information12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service
12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford
More informationHIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP
HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right
More informationChapter 9: Backups. Presenter: Rick Oelerich. Tech 3.0
5 Chapter 9: Backups Presenter: Rick Oelerich Tech 3.0 173 Introduction Why do we do backups? Hardware Failure Disaster Recovery Equipment Theft Data Loss or Corruption filename 2 173 Introduction What
More informationC&G FLUX MARKET Internet Safety
Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs
More information7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters
7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters If You Depend On Your Computer Network To Run Your Business,
More informationInformation Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
More informationPart 14: USB Port Security 2015
Part 14: USB Port Security This article is part of an information series provided by the American Institute of Healthcare Compliance in response to questions we receive related to Meaningful Use and CEHRT
More informationOnline Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
More informationBackup & Disaster Recovery for Business
Your complete guide to Online Backup and Disaster Recovery Backup & Disaster Recovery for Business 1 Doc V1.0 Jan 2014 Table of Contents 3 Hosted Desktop Backup and Disaster Recovery (DR) today 4 Different
More informationWhat I want new lawyers to know
What I want new lawyers to know 1 With Jim Calloway Director Oklahoma Bar Association Management Assistance Program Email jimc@okbar.org Twitter @jimcalloway Blog http://jimcalloway.typepad.com YouTube
More informationStudents Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
More informationSimple Backup Strategy for Home Computers
Simple Backup Strategy for Home Computers Corey's Postulate of Data Loss: "If you want to lose it, keep only one copy of it." From Corey Keating (www.computersecuritynw.com) Backing up the information
More informationTechnological foundations of an efficient, reliable law office network
Technological foundations of an efficient, reliable law office network Prepared by Brian Mauch for the Trial Lawyers Association of BC conference Maximize Your Personal Injury Practice: 20 Ways to Get
More informationSecuritySecuritySecurity!
SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE
More informationClickfree The Effortless Backup Solution
Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:
More informationIn the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org
In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
More informationThe 10 Disaster Planning Essentials For A Small Business Network
The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
More informationClickfree frequently asked questions
Clickfree frequently asked questions Q: What is Cloud Storage? A: Cloud Storage is a term used for storing data remotely via the Internet. Cloud companies such as Elephant Drive provide this service. Q:
More informationEnsuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
More informationSBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
More informationEthical Applications of New Legal Technology: Conflict Checking, Cloud Computing, Electronic Use & Social Media
Ethical Applications of New Legal Technology: Conflict Checking, Cloud Computing, Electronic Use & Social Media By Todd C. Scott, VP Risk Management Minnesota Lawyers Mutual Ins. Co. The purpose of a conflicts
More informationDacorum U3A Computer Support Group. Friday 27th March 2015
Dacorum U3A Computer Support Group Archiving and Backup for Windows PC's. This will include local backup to HD, USB Memory, NAS and Cloud storage. Friday 27th March 2015 Agenda Discussion about format
More informationNQ Mobile Security Frequently Asked Questions (FAQs) for Android
NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running
More information31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
More information12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service
12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford
More informationIT Decisions for Small Business
IT Decisions for Small Business The most frequently asked questions and answers By Keith Powell and Chris Brandow, Invision Partners Computing technology has become a necessary business tool, and there
More informationSecrets to Backups and Disaster Recovery for Architects. How to Prevent Losing Your Data And Losing Your Business
Secrets to Backups and Disaster Recovery for Architects How to Prevent Losing Your Data And Losing Your Business Secrets to Backups & Disaster Recovery 1 About ArcSource 2 Backup Stats and Stories 3 Backup
More informationThe Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches
The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches by Sharon D. Nelson, Esq. and John W. Simek 2011 Sensei Enterprises, Inc. Another day, another data breach. Data
More informationOctober Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
More informationThe Disconnect Between Legal and IT Teams
WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,
More informationSafe-Guarding Client Information Basic Data Security Training for Lawyers
Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes
More informationNeoscope www.neoscopeit.com 888.810.9077
Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,
More informationApptix Online Backup by Mozy
Apptix Online Backup by Mozy What is Apptix Online Backup by Mozy? Apptix Online Backup by Mozy is a secure online data backup service. It's a simple, smart, and economical way to protect your data from
More informationDisaster Prevention and Recovery Plan
Disaster Prevention and Recovery Plan for Windows Based Networks by Jeff Kendrick, 1. Prevention A. Daily tape backups B. Monthly Automated System Restore (ASR) or Windows 2008 backups and updates C. Alternate
More informationIT Disaster Recovery How Prepared are You?
IT Disaster Recovery How Prepared are You? Sesame Webinar Series Steve McEvoy September 18 th, 2012 Goals To discuss technology in a way that might actually be useful to you in your practice Share ideas
More informationSCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.
deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified
More informationUsing Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox
(Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine
More informationCD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.
Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page
More informationData Security in the Insurance Industry: WHAT YOU NEED TO KNOW
Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW Lock Down That Data Today, some insurance professionals store or share terabytes of electronic information, some of which is sensitive personal
More informationThis guide will go through the common ways that a user can make their computer more secure.
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
More informationBacking Up Your Files. External Hard Drives
Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine
More informationStorage, backup, transfer, encryption of data
Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research
More informationBackup, Backup, Backup
1 Backup, Backup, Backup What is a Back Up? In information technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationBeen in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director
Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationCountering and reducing ICT security risks 1. Physical and environmental risks
Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of
More informationQ1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?
Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com mary@iconusersgroup.org
More information16 Common Backup Problems & Mistakes
16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than
More informationTechnology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network
Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationSecure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP
Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and
More informationBefore proceeding with the update process, Back-up/Synch your data to maintian: Calendar Events Contacts E-mail Accounts Messages
Samsung Repp Bootloader Update Instructions Samsung has released a Bootloader Update for the Samsung Repp (SCH-R680) to correct a network connectivity issue. Please follow the instructions below to download
More informationComputer Security, Maintenance and Backup
Computer Security, Maintenance and Backup 1. Use of virus protection There are at least 3 popular free anti-virus programs you can download. They are AVG, Avast and Microsoft Security Essentials. They
More information