How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning

Size: px
Start display at page:

Download "How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning"

Transcription

1 How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning By Jim Calloway Publisher: Jim Calloway s Law Practice Tips at Digital Disaster stories are becoming more and more common. It seems like everyone has heard a story of a recent hard drive crash or a power surge that ruined some equipment. Generally speaking, there are two broad approaches to avoid the impact of a digital disaster on your business. Both of these approaches must be followed religiously to protect the law firm data. The first of those areas is to have appropriate and adequate data backup and storage procedures. The second of these areas is to employ technology tools and office policies that protect your office network from unnecessary risks

2 Let s discuss backup first. Backup is extremely important and the number of firms that fail to do backup adequately is still shocking. Let s look at a few statistics. Company Bankruptcy - 93% of companies that lost their data for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. (National Archives & Records Administration in Washington) Tape backup Failure - 34% of companies fail to test their tape backups, and of those that do, 77% have found tape back-up failures. (The Gartner Group) Theft - A laptop is stolen every 53 seconds (FBI) Some might be surprised at the different causes for losses of data. Here s a breakdown. Hopefully, the case for backing up is irrefutable. So the question is what method to use. Backup tapes are an outdated technology. While large firms with dedicated IT departments may still appropriately use tape backup processes, solo or small firms lawyer who are doing their own backup should no longer be using tapes. Backup tapes are unreliable, more expensive, increasingly harder to find and are more difficult to restore than backups created using a portable hard drive. The image at the right is a Western Digital - My Passport Essential SE 1TB External USB 2.0 Portable Hard Drive. For those who are not familiar with the term TB, it stands for terabyte. A terabyte equals 1024 Gigabytes. This drive plugs into a computer s USB port. It comes with pre-installed software to first backup an entire hard drive

3 and then regularly backup any new or changed files on a schedule that you specify. It also provides password protection and encryption. The cost for this device with its huge amount of storage, coupled with all the software you need preinstalled is $ at the local Best Buy when I last checked. There are less expensive models with the same preinstalled software and less storage capacity. There are a few other considerations for valuable law office data. But if you haven t been backing up all of those family photos and itunes music purchases on the home computer, maybe you need to stop at a Best Buy on the way home and protect the important family digital data now. For the law office computer network, a more complete data backup is required. (Although if you haven t done a backup in weeks, do this on the way home and you ll be in better shape in the morning than you are now backup wise.) Surely every lawyer can appreciate the consequences of the loss of all the word processing forms and all of the billing records without even going into , contacts, calendar entries and other important information on the office network. The careful lawyer will have at least two, and more likely three or more, separate data backup processes. Storing a fairly current backup outside of the office is critical in case the office is hit by fire or flood. (Speaking of flooding, it is important that computers and servers are not stored on the floor in case of minor flooding or water from firefighters. A five or six inch high stand for every computer may save you tons of aggravation some day in the future.) Offsite backup can be accomplished in many ways. One could buy several of the portable hard drives and rotate them outside of the office. (Although data security experts recommend that remote data storage is at least 100 miles from the office.) Other law firms will utilize automated remote backup services. Some will make use of manual uploads to document repositories. Once you have a good backup plan in operation, you need to conduct test restores. A backup is only good if you know how to restore the backed-up data. Every lawyer, no matter how technically ignorant otherwise, must know how to restore from the backup. It may be their brief that needs to be covered today and no one may be available to help them. One should not discount the idea of spot backups as well. One might copy forms or an Outlook PST file to a thumb drive, just to have another copy. If one has been

4 working on a brief for several hours, ing a copy to your Gmail account or copying it to a thumb drive is a good backup plan. Cloud computing practice management solutions are a relatively new concept that include backup as a part of the service but create other data security concerns for many lawyers. To paraphrase the old cliché, one can never have too much money, be too thin or have too many backups. It should also be noted that the more a law firm has gone paperless with digital client files, the more a backup will have the effect of restoring the entire law practice in the event of physical office destruction. See my article The Paperless Office as a Risk Management Enterprise at Disaster Plans In addition to a backup plan, a written general disaster recovery plan is required. Each law firm, whether a solo lawyer or a larger firm, needs to create a backup plan and put it both in writing and into practice. It must be protection prioritized. This means protect the people first then protect the business assets. Recovery tends to work in the same order. First, a mechanism for locating and contacting people (employees, clients, courts) and then mechanisms for protecting the business s assets and ability to continue to operate and meet its legal and financial obligations. What is the Essential Core of Your Practice that absolutely, positively must remain operational? Review the potential disasters and what your responses would be to each. Draft Your Plan write it not only in plain English but also to be understandable by panicked, stressed out people who have just experienced a disaster! Diversify your Options in other words, have backup plans for your backup plans (anticipate Murphy s Law and don t put all your disaster recovery eggs in one basket!) Plan for Failure not unlike advising a client to always plan for litigation build redundancy into your technology systems fully expecting digital disasters to hit Fire Drills you have to take your plan seriously and conduct straight-faced tests on a regular basis

5 The American Bar Association provides disaster recovery information and links at and Internet Security Passwords Strong passwords are a critical security concept. Many lawyers use passwords and password recovery options that are not adequate. More of you should consider strong password managers, like Roboform ( or LastPass ( with an installation of the product on a secure flash drive. Sarah Palin s Yahoo account was hacked by someone doing some online research and figuring out her Yahoo password recovery question and answer might be where did you meet your true love? with the answer being the name of her high school. So how long do you think it would take someone to search online obituaries and figure out your mother s maiden name? It is strongly suggested that you make up a fictitious mother s maiden name like BX345!! and use it for your security question answer to that question. If you use weak passwords than nothing is secure. But most of us cannot remember passwords if they are strong enough to be secure. A password cannot be any word that might appear in a dictionary. Restore Points Another important security issue is learning how to set Restore Points and use them effectively. This is a powerful tool that many users simply ignore. No matter how secure your defenses, it is likely that your computer will get fouled up at some time whether from spyware or other malware or just the installation of a new application that conflicts with something on your computer. It is a real time-saver just to be able to set the computer back to the settings from yesterday or a few hours ago. Microsoft provides tutorials for restore points. Here are some links to some sources of information. Windows XP System Restore Guide

6 Windows Vista System Restore Guide How to Create a Restore Point in Windows Firewalls, Anti-Spyware and Antivirus A firewall is your guard to keep the bad things outside of your computer network. The Microsoft firewall actually works quite well. In fact Microsoft s entire suite of security tools work quite well and they are free. It is understandable that many will still wish to rely on third party tools given the history of their superiority and the fact that malware designers would try to build tools that would defeat the widely-used Microsoft tools if possible. Microsoft Security Essentials is a free antivirus and spyware package. Microsoft also has a malware removal tool When I want to purchase a new utility, such as anti-malware tools, I go to the reviews on C Net, PCMag.com and PCWorld.com to see what the current state of effectiveness is at the moment. I d never purchase a Norton anti-malware utility of any kind based on past experiences, but that s just me. This following link is to a chart of malware testing results by the people at Virus Bulletin. They tested software for current malware (reactive) and future malware (proactive) detection. The higher the malware application is on the chart (vertical axis) and the farther to the right (horizontal axis) reflects its effectiveness. This was based on testing in April 2010 and should be valuable for at least the rest of the year. If you ever encounter a computer with really bad malware infection, it may be really hard to repair. Often these are caused by people clicking on what they think are ads for anti-malware and actually approving the installation of malware on their machine under the guise of it being antimalware protection. These insidious infections will actually block one from visiting antimalware sites and downloading help. You can

7 manually delete the infected files, but parts hide in your registry and other places and it keeps coming back. Here s the most effective method I have found short of giving up and reformatting the hard drive: 1) Disconnect the infected computer from the Internet and any network. If it is laptop, disable wireless networking. 2) Go to another computer and download the free version of MalwareBytes Antimalware from to a flash drive. Do not install it. Load the.exe file to the flash drive. 3) Put the flash drive into the infected computer and copy the.exe file to the infected computer. Remove the flash drive immediately. (No sense taking chances on infecting it, even though that is not likely.) 4) Run the file on the infected PC to install MalwareBytes Anti-malware on the infected computer. Turn off all power save, screen saver and go to sleep settings on the infected computer as this may take hours. Run it and see what happens. 5) Consider buying the premium package out of gratitude if it works. (And one day soon you may have to buy the premium package to so this anyway.) Malware Prevention Every six months one should remind office staff and lawyers that they should never, never click on attachments to or links in s unless they are sure of the source. It is OK to telephone someone to ask did you really send me that? Although there are such things as Microsoft Word Macro viruses, it is generally safe to open documents. Files ending with.exe or.htm or.php are particularly suspect and generally not the types of files that a law office would be ed. Whatever firewall or anti-malware solution you employ, make certain it is set for automatic updates and that you pay for your annual fee as soon as you are aware it is due

8 iphones: Too Insecure for Lawyers? My good friends and colleagues, Sharon D. Nelson and John Simek, have taken the lead in criticizing the iphone s lack of security. (Sharon is my teammate on our monthly Digital Edge: Lawyers and Technology podcast.) Their article Why Lawyers Shouldn t Use The iphone: A Security Nightmare bears reading by every lawyer who is contemplating an iphone purchase. You should read that piece in its entirely to appreciate my security tips below. However, I must note that I have read the article several times and I m not giving up my iphone. But I do appreciate that Apple has a poor design in that the passcode is too easy for a pro to bypass. Hopefully if I lose my iphone it won t be found by a pro. IPhone Security Tips 1) Don t lose your iphone. All of security questions about the iphone revolve around what can be done if someone with expertise comes into possession of your iphone. 2) Use a passcode to lock the phone. Yes, it makes the phone a little less easy to use, but it is the equivalent of locking your doors on your office. 3) Set the iphone to automatically wipe its data after ten consecutive incorrect passcode attempts. 4) Consider other remote wiping and lost phone locator options. MobileMe may sound like a good investment to many. It is a $99 per year service from Apple that allows you to track the location of an lost or stolen iphone and to remote wipe all of its data if it is connected online. 5) As soon as possible after losing an iphone, change your passwords on your e- mail, contacts and social networking accounts. 6) Regularly sync the iphone to itunes to back up your apps and data. 7) Consider what data may be carried on your iphone. Some may opt not to have the office on the phone. Others may do periodic wipes of the phone and then restore the settings and apps (but not the data) via itunes. 8) Put your business card in the iphone protective case with Reward offered for return of lost iphone written on the back to help encourage someone to do the right thing

9 9) Don t lose your iphone. Metadata Disclosure Solutions By now, hopefully most all practicing lawyers are aware of the possible dangers of inadvertently disclosing client confidences or other embarrassing material via hidden metadata. A full discussion of metadata is outside of the scope of this discussion, but one can read my blog post, The Mysteries (and Magic) of Metadata at There are many possible solutions to the issue of disclosing metadata. Some combination of the following may work best for your office. Purchasing a metadata scrubber and using it is the best solution. Fax or snail mail rather than . Copy all text (Cntrl +A, Then Cntrl + C) and Paste it into a blank document. Note: This will carry some metadata, but not Track Changes or Deleted Comments. Copy all text (Cntrl +A, Then Cntrl + C) and Paste Special- Unformatted Text into a blank document. Note: You lose the metadata, but the document formatting as well. Every time you send an attachment that you have created or edited, send it out in PDF format (with rare exceptions) My Personal Best Practice Solution Note: PDF files will contain some metadata, but that limited kind is unlikely to cause trouble. This is not practical when you are co-authoring a document with another. With co-counsel, you just need to discuss the issue. With opposing counsel, you may need to use a metadata scrubber. Microsoft Word 2002 Review white paper at but consider upgrading or buying a metadata scrubber. Microsoft Word 2003 (and other MS Office products) Download and install the Remove Hidden Data Tool for Office 2003 and Office XP Microsoft Word 2007 The Remove hidden data tool is built in. No separate download required. (Note: Computer forensics experts tell us the results from the free Microsoft tools listed above are imperfect.) Corel WordPerfect Upgrade to Versions X3 or X4 which have the publish without metadata feature. WP versions 9 and higher have the publish to PDF

10 option built it as well. (WP has less potentially dangerous metadata than Microsoft Word in the first place.) Purchase a third party metadata scrubber and use it. There are many such products, but we direct your attention to the Metadata Assistant from (Direct link to retail version - An Enterprise version for more than 20 workstations available as well.) At a purchase price of $79 per license, this is a tool that most law firm should consider. This will also allow you to view the metadata in other files, not that I can assure you that practice is always ethically permissible

Technology Special Interest Group

Technology Special Interest Group Technology Special Interest Group 2014 2015 Schedule Sept: Backing Up Your Data Oct: Archiving 1: Organizing Your Files Nov: Home Networking Dec: Archiving 2: Metadata Jan: Security Feb: Archiving 3: Storage

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

PC/Tablet/Smartphone Security & Password Managers

PC/Tablet/Smartphone Security & Password Managers PC/Tablet/Smartphone Security & Password Managers What you should do to keep your PC secure. Does the type of PC you use matter? What to do to keep your smartphone secure does the brand matter, why? Tablet

More information

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses 2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...

More information

Introduction to Microsoft Small Business Server

Introduction to Microsoft Small Business Server Summary The aim of this article is to present some basic information about Small Business Server 2003 and how it can fit in with your business. Topics What is Small Business Server? (also known as SBS)

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Backup and Recovery Plan For Small Businesses

Backup and Recovery Plan For Small Businesses Backup and Recovery Plan For Small Businesses Disclaimer: This article is intended to serve as an informational reference source. While the information is based on sound principles for backup and recovery,

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Disaster Recovery Planning Save Your Business

Disaster Recovery Planning Save Your Business Disaster Recovery Planning Save Your Business Your business at risk! Your company is at risk for failure in the event of disaster Your data is at risk for costly loss Your revenue is at risk with lack

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

Offsite Backup with Fast Recovery

Offsite Backup with Fast Recovery SMALL BUSINESS ESSENTIAL TECHNOLOGY INTRODUCTION Offsite Backup with Fast Recovery How not to be stranded, pulling your hair out, waiting a couple of weeks for your server to be rebuilt. STOP USING TAPE

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

What You Should Know About Cloud- Based Data Backup

What You Should Know About Cloud- Based Data Backup What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com

More information

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

SAFEGUARDING YOUR WINDOWS COMPUTER

SAFEGUARDING YOUR WINDOWS COMPUTER SAFEGUARDING YOUR WINDOWS COMPUTER February 2011 www.cybersecurityguy.com 1 SAFEGUARDING YOUR WINDOWS COMPUTER It's important to safeguard your computer to protect your personal information against hackers

More information

Is Cloud Computing Inevitable for Lawyers?

Is Cloud Computing Inevitable for Lawyers? Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses.

Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses. Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses. Anthony Suda Network Manager marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000

More information

The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software.

The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. INSTALLATION & CONFIGURATION The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. 1. System Requirements The following minimum system requirements

More information

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department managed services ebook Meet the Always On IT Department meet the always on it department PROPHET Business Group 1 MEET THE ALWAYS ON IT DEPARTMENT As IT gets more complicated it gets easier for the daily

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

Desktop or Laptop Diagnostic $49.99

Desktop or Laptop Diagnostic $49.99 Desktop or Laptop Diagnostic $49.99 Important: For online service we need a high-speed internet connection and a working computer Expert Troubleshooting $49.99 On-Line, MSD Office On-Site Computer hardware

More information

Clickfree C6 Easy Imaging October 24, 2011

Clickfree C6 Easy Imaging October 24, 2011 HOW LONG WILL THE FIRST BACKUP TAKE? Clickfree Total Computer Backup can take a few hours to complete when first plugged in. Since Clickfree will copy absolutely everything from your computer (including

More information

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses)

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses) The Real Cost of Do-It-Yourself Backups and Why Online Backup is Better This white paper discloses the real costs to a small business for performing proper data backups in-house using portable hard drives,

More information

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

FiVE FATAL MYTHS ABOUT DATA BACKUP. Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood.

FiVE FATAL MYTHS ABOUT DATA BACKUP. Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood. FiVE FATAL MYTHS ABOUT DATA BACKUP Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood. Protect your business before a data loss becomes catastrophic.

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

BACKING UP YOUR PC. Ed Schwartz January 2012

BACKING UP YOUR PC. Ed Schwartz January 2012 BACKING UP YOUR PC Ed Schwartz January 2012 Why should you back up? Do you have any data that can t be easily recreated? If you PC crashes do you want to be back online in minutes instead of hours? It

More information

Cyber Security Best Practices

Cyber Security Best Practices Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters

More information

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook. Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer

More information

January 2016 Issue #2 Windows Backup

January 2016 Issue #2 Windows Backup January 2016 Issue #2 Windows Backup In the prior issue, I preached the virtues of frequent backups. Well, now it s time to detail the how-to of backups, and we will begin with Windows Backups. Built into

More information

Transcription. Crashplan vs Backblaze. Which service should you pick the short version

Transcription. Crashplan vs Backblaze. Which service should you pick the short version Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.

More information

Computer Backup Strategies

Computer Backup Strategies Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service 12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

Chapter 9: Backups. Presenter: Rick Oelerich. Tech 3.0

Chapter 9: Backups. Presenter: Rick Oelerich. Tech 3.0 5 Chapter 9: Backups Presenter: Rick Oelerich Tech 3.0 173 Introduction Why do we do backups? Hardware Failure Disaster Recovery Equipment Theft Data Loss or Corruption filename 2 173 Introduction What

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs

More information

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters 7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters If You Depend On Your Computer Network To Run Your Business,

More information

Information Systems. Connecting Smartphones to NTU s Email System

Information Systems. Connecting Smartphones to NTU s Email System Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone

More information

Part 14: USB Port Security 2015

Part 14: USB Port Security 2015 Part 14: USB Port Security This article is part of an information series provided by the American Institute of Healthcare Compliance in response to questions we receive related to Meaningful Use and CEHRT

More information

Online Backup by Mozy. Common Questions

Online Backup by Mozy. Common Questions Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup

More information

Backup & Disaster Recovery for Business

Backup & Disaster Recovery for Business Your complete guide to Online Backup and Disaster Recovery Backup & Disaster Recovery for Business 1 Doc V1.0 Jan 2014 Table of Contents 3 Hosted Desktop Backup and Disaster Recovery (DR) today 4 Different

More information

What I want new lawyers to know

What I want new lawyers to know What I want new lawyers to know 1 With Jim Calloway Director Oklahoma Bar Association Management Assistance Program Email jimc@okbar.org Twitter @jimcalloway Blog http://jimcalloway.typepad.com YouTube

More information

Students Mobile Messaging Registration & Configuration

Students Mobile Messaging Registration & Configuration Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established

More information

Simple Backup Strategy for Home Computers

Simple Backup Strategy for Home Computers Simple Backup Strategy for Home Computers Corey's Postulate of Data Loss: "If you want to lose it, keep only one copy of it." From Corey Keating (www.computersecuritynw.com) Backing up the information

More information

Technological foundations of an efficient, reliable law office network

Technological foundations of an efficient, reliable law office network Technological foundations of an efficient, reliable law office network Prepared by Brian Mauch for the Trial Lawyers Association of BC conference Maximize Your Personal Injury Practice: 20 Ways to Get

More information

SecuritySecuritySecurity!

SecuritySecuritySecurity! SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE

More information

Clickfree The Effortless Backup Solution

Clickfree The Effortless Backup Solution Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

Clickfree frequently asked questions

Clickfree frequently asked questions Clickfree frequently asked questions Q: What is Cloud Storage? A: Cloud Storage is a term used for storing data remotely via the Internet. Cloud companies such as Elephant Drive provide this service. Q:

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Ethical Applications of New Legal Technology: Conflict Checking, Cloud Computing, Electronic Use & Social Media

Ethical Applications of New Legal Technology: Conflict Checking, Cloud Computing, Electronic Use & Social Media Ethical Applications of New Legal Technology: Conflict Checking, Cloud Computing, Electronic Use & Social Media By Todd C. Scott, VP Risk Management Minnesota Lawyers Mutual Ins. Co. The purpose of a conflicts

More information

Dacorum U3A Computer Support Group. Friday 27th March 2015

Dacorum U3A Computer Support Group. Friday 27th March 2015 Dacorum U3A Computer Support Group Archiving and Backup for Windows PC's. This will include local backup to HD, USB Memory, NAS and Cloud storage. Friday 27th March 2015 Agenda Discussion about format

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service 12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

IT Decisions for Small Business

IT Decisions for Small Business IT Decisions for Small Business The most frequently asked questions and answers By Keith Powell and Chris Brandow, Invision Partners Computing technology has become a necessary business tool, and there

More information

Secrets to Backups and Disaster Recovery for Architects. How to Prevent Losing Your Data And Losing Your Business

Secrets to Backups and Disaster Recovery for Architects. How to Prevent Losing Your Data And Losing Your Business Secrets to Backups and Disaster Recovery for Architects How to Prevent Losing Your Data And Losing Your Business Secrets to Backups & Disaster Recovery 1 About ArcSource 2 Backup Stats and Stories 3 Backup

More information

The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches

The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches by Sharon D. Nelson, Esq. and John W. Simek 2011 Sensei Enterprises, Inc. Another day, another data breach. Data

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

Apptix Online Backup by Mozy

Apptix Online Backup by Mozy Apptix Online Backup by Mozy What is Apptix Online Backup by Mozy? Apptix Online Backup by Mozy is a secure online data backup service. It's a simple, smart, and economical way to protect your data from

More information

Disaster Prevention and Recovery Plan

Disaster Prevention and Recovery Plan Disaster Prevention and Recovery Plan for Windows Based Networks by Jeff Kendrick, 1. Prevention A. Daily tape backups B. Monthly Automated System Restore (ASR) or Windows 2008 backups and updates C. Alternate

More information

IT Disaster Recovery How Prepared are You?

IT Disaster Recovery How Prepared are You? IT Disaster Recovery How Prepared are You? Sesame Webinar Series Steve McEvoy September 18 th, 2012 Goals To discuss technology in a way that might actually be useful to you in your practice Share ideas

More information

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system. deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified

More information

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine

More information

CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.

CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks. Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page

More information

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW

Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW Data Security in the Insurance Industry: WHAT YOU NEED TO KNOW Lock Down That Data Today, some insurance professionals store or share terabytes of electronic information, some of which is sensitive personal

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

Storage, backup, transfer, encryption of data

Storage, backup, transfer, encryption of data Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research

More information

Backup, Backup, Backup

Backup, Backup, Backup 1 Backup, Backup, Backup What is a Back Up? In information technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk? Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com mary@iconusersgroup.org

More information

16 Common Backup Problems & Mistakes

16 Common Backup Problems & Mistakes 16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than

More information

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and

More information

Before proceeding with the update process, Back-up/Synch your data to maintian: Calendar Events Contacts E-mail Accounts Messages

Before proceeding with the update process, Back-up/Synch your data to maintian: Calendar Events Contacts E-mail Accounts Messages Samsung Repp Bootloader Update Instructions Samsung has released a Bootloader Update for the Samsung Repp (SCH-R680) to correct a network connectivity issue. Please follow the instructions below to download

More information

Computer Security, Maintenance and Backup

Computer Security, Maintenance and Backup Computer Security, Maintenance and Backup 1. Use of virus protection There are at least 3 popular free anti-virus programs you can download. They are AVG, Avast and Microsoft Security Essentials. They

More information