Articles – Page 2 – Legal Technology Solutions

How good is your password

How good is your password? Did you know that having a weak password is one of the biggest security risks you face? This blog focuses on the best practices related to passwords that you can follow to ensure passwords are not your weakest link. Avoid sequences and repetitions: How many times have you used passwords like dollar12345 or $$$BobMckinley. Passwords containing sequences and repetitions are just easier to hack. Avoid using your personal data: Do not make your birth date, bank account [...]

Read more...

Keeping your data safe: Access Control

Keeping your data safe: Access Control Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold it hostage, but also inflict irreversible damage on your brand and business. As a norm, most businesses these days do invest in anti-virus/cybersecurity systems. But, is that really enough? The answer is–NO. Because, they often overlook one important aspect–access. Ask yourself, how easy is your data to access? How can you strengthen the [...]

Read more...

A security hack doesn’t have to mean the end of your company

A security hack doesn’t have to mean theend of your company Statistics are showing that each year over 50% of small firms are victims of a cyber attack or data breach. Why does this matter? Most smaller firms have not prepared business continuity plans to keep their IT infrastructure going in the event of an attack. Failing to do so often leads to the failure of the business. Delaying the creation of a business continuity [...]

Read more...

Don’t steal… It isn’t nice and makes you vulnerable to security hacks

Don’t steal… It isn’t nice and makes youvulnerable to security hacks Don’t steal. It isn’t nice. And… it make you extremely vulnerable you security hacks if you “steal” software packages. Smaller firms often will use unlicensed software packages to save money. This is especially true if they only need a program for a specific task. Aside from the legal and ethical issues involved here, there is a very selfish reason not to do this. Software [...]

Read more...

Cybercrime: In-house protection that only YOU can provide

Cybercrime: In-house protection that only YOU can provide From the political world to the corporate, all we hear about is hacking, hacking, hacking. Everyone gets hacked, data is stolen, etc. So, the cry goes up for better security protections for everyone’s data. Firewalls, virus software, etc., etc., etc. Want to know one of the best ways to protect your data? Train your employees to stop opening any emails or links unless they absolutely know they are safe. [...]

Read more...

Cybercrime: In-house protection that only YOU can provide

Cybercrime: In-house protection that only YOU can provide From the political world to the corporate, all we hear about is hacking, hacking, hacking. Everyone gets hacked, data is stolen, etc. So, the cry goes up for better security protections for everyone’s data. Firewalls, virus software, etc., etc., etc. Want to know one of the best ways to protect your data? Train your employees to stop opening any emails or links unless they absolutely know they are safe. [...]

Read more...

VoIP: A money saving solution for your company’s technology backbone

VoIP: A money saving solution for your company’s technology backbone When small business managers think about their IT infrastructure, they think about their employee’s mobile devices, cabling, Wi-Fi, laptops, a printer, and Internet connectivity. These are the basics of their IT infrastructure. However, there is one other aspect of a modern corporate IT infrastructure and that is an internal phone system that can connect “voice” over the internet, rather than traditional copper wires. Once upon a time, [...]

Read more...

VoIP: A money saving solution for your company’s technology backbone

VoIP: A money saving solution for your company’s technology backbone When small business managers think about their IT infrastructure, they think about their employee’s mobile devices, cabling, Wi-Fi, laptops, a printer, and Internet connectivity. These are the basics of their IT infrastructure. However, there is one other aspect of a modern corporate IT infrastructure and that is an internal phone system that can connect “voice” over the internet, rather than traditional copper wires. Once upon a time, [...]

Read more...

SAFETY PUP SAYS…. Update

SAFETY PUP SAYS…. Update One thing smaller firms and individuals are often reluctant to do is download updates to their operating systems and individual apps and programs. Why? Well, because it takes time and you have to reboot the device. Other reasons are a fear that the newest update will have a bug and cause problems. The perception is that it is better to wait a few weeks. Finally, there is a fear that anytime you update a [...]

Read more...

How to hack into Windows 10

You think I can’t hack into your Windows 10 computer? Think again… In this video, I’ll show you how EASY it is, with a small free program you can get online (“Hirens Boot CD” www.hirensbootcd.org), to wipe or replace ANY Windows computer! The goal is not to promote illegal activities- but instead- to maybe get in front of the right people at Microsoft, so they can fix this security hole. PLEASE make sure to use DRIVE ENCRYPTION for all your devices, and [...]

Read more...