Quantcast
Channel: Security Archives - Law Technology Today
Browsing all 50 articles
Browse latest View live

How the Cybersecurity Act is Changing IoT Security

Twenty-six billion devices are currently connected to the internet of things, but by 2025, this is expected to skyrocket to 75 billion. Lawmakers are in a race against time to ensure that the new...

View Article



Clicking Away Your Privacy and More

Some have used the old joke about the check being in the mail to equate the biggest lie on the internet as agreeing to the terms and conditions. We are all guilty of scrolling quickly to the bottom of...

View Article

Best Ways to Secure Your Legal Site

There’s no doubt that for a legal firm, cybersecurity is a priority. And there’s a ton of reasons for that: You’re storing personal data of your clients, who also provide you with billing information...

View Article

Email Security Tips for Lawyers

Lawyers may receive sensitive documents from clients quite often, depending on their specialization. Whether you’re a real estate lawyer receiving mortgage documents, or a criminal lawyer looking at...

View Article

The Importance of Cybersecurity Standards in the Legal Field:  What is “NIST”?

Legal services rely significantly on knowledge and information.  In addition, the attorney-client relationship cannot exist without confidentiality and privacy.  For these reasons, the protection of...

View Article


Five Safety Tips for Digital Payments

As consumers, most of us prefer the use of digital, card-based or online payments for our retail purchases because of the convenience and security they offer. The use of cheques for everyday...

View Article

Four Ways Law Firms Can Safeguard Sensitive Client Data

To say that law firms handle a lot of data would be an understatement. Firms must manage case information, communication records, and myriad documents shared with courthouses, notaries, and other legal...

View Article

What to Know About Big Brother Technology

Let’s admit it: We have all been completely and utterly duped into allowing ourselves to be constantly surveilled. In other words, we’ve managed to find ourselves in a situation where nearly every...

View Article


Data Security, Your Client’s and Yours

Lawyers like you have access to sensitive information. You are also privy to confidential data that was entrusted to you by your clients. After all, information is essential to law practice. That’s why...

View Article


Cybersecurity Tips to Keep Your Business Safe

Cybercrime is a very real and rapidly growing threat. Today, cyber threats are one of the top concerns of modern global business leaders. Unfortunately, this threat is still not being effectively...

View Article

How to Stay Safe On Airport WiFi

The more people you share an internet connection with, the more vulnerable you are to data theft. That is why it is always safe to browse the internet from home or at the workplace where the networks...

View Article

AML Screening and Its Significance in the Global Regulations

Anti-money laundering compliance is becoming vital across the world. The need for AML compliance is increasing rapidly. A large number of global GDP (2% to 5%) is affected as a result of money...

View Article

How To Secure Your Online Legal Writings

For a law firm to stay on top of the game in today’s digital world, it goes online. A website launch, high-quality content creation, marketing, and promotion—these are instruments helping lawyers...

View Article


Sick on the Inside

The American Cancer Society deals with illnesses of the human sort, but recently they had to deal with another kind of toxic illness silently taking over. On the outside, things looked fine. But on the...

View Article

Beware of Public USB-Charging Stations

We have learned about the dangers of airport WiFi, but something else people are often seeking in airports is a place to charge their devices. Charging your device in public using a handy USB public...

View Article


How to Increase Security During Mobile App Development

Mobile app security is an extremely important aspect of every app as it ensures that your users are safe and secure with their data while you as a developer know that everything is alright....

View Article

Alexa, How Do I Protect My Organization’s Data From You?

Has Alexa infiltrated your company yet? There are 3.25 billion users of digital voice assistants in the world. It stands to reason that if you haven’t seen one of these devices on employees’ desks yet,...

View Article


Identity Theft and Fraud: How to Evaluate and Manage Risks

Fraud and identity theft have run rampant over the years, leaving millions of victims in their wake picking up the pieces of their life—or what’s left of it. To stand up to identity theft and the...

View Article

Protecting Your Business From Internal Threats

As an entrepreneur, when you set out to start a business, you’ve likely weighed out the pros and cons. A formal way of doing this would be by carrying out a risk analysis that identifies potential...

View Article

Pandora’s Forensic Box: The Data You Didn’t Know Existed

You’ve likely heard the reference to Greek mythology’s “Pandora’s Box”.  Something that at first seems valuable but then presents unexpected troubles. While many things in our culture could fall into...

View Article
Browsing all 50 articles
Browse latest View live




Latest Images