Uncategorized – Page 2 – Legal Technology Solutions

Cybercrime: In-house protection that only YOU can provide

Cybercrime: In-house protection that only YOU can provide From the political world to the corporate, all we hear about is hacking, hacking, hacking. Everyone gets hacked, data is stolen, etc. So, the cry goes up for better security protections for everyone’s data. Firewalls, virus software, etc., etc., etc. Want to know one of the best ways to protect your data? Train your employees to stop opening any emails or links unless they absolutely know they are safe. [...]

Read more...

VoIP: A money saving solution for your company’s technology backbone

VoIP: A money saving solution for your company’s technology backbone When small business managers think about their IT infrastructure, they think about their employee’s mobile devices, cabling, Wi-Fi, laptops, a printer, and Internet connectivity. These are the basics of their IT infrastructure. However, there is one other aspect of a modern corporate IT infrastructure and that is an internal phone system that can connect “voice” over the internet, rather than traditional copper wires. Once upon a time, [...]

Read more...

How to hack into Windows 10

You think I can’t hack into your Windows 10 computer? Think again… In this video, I’ll show you how EASY it is, with a small free program you can get online (“Hirens Boot CD” www.hirensbootcd.org), to wipe or replace ANY Windows computer! The goal is not to promote illegal activities- but instead- to maybe get in front of the right people at Microsoft, so they can fix this security hole. PLEASE make sure to use DRIVE ENCRYPTION for all your devices, and [...]

Read more...

Cyberattacks and the vulnerability of the small business

   Cyberattacks and the vulnerability of the small business   You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring. What any business, but especially a small business, needs to be afraid of are cyber attacks that disable your [...]

Read more...

Denial is not a solution: Something you owe your customers and your employees

    Denial is not a solution: Something you owe your customers and your employees   Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen–at least in the foreseeable future, and I‘ve got more interesting things to worry about or spend my money on” issues.   Small business owners tend to take the same approach to making business continuity plans in case [...]

Read more...

Limited investment capital and planning for trouble

    Limited investment capital and planning for trouble   Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to address these issues because they lack the necessary capital to invest in additional or supplemental equipment. Redundant servers, battery back systems or uninterruptible power supplies, and data backup systems that allow [...]

Read more...

Data Protection Laws and PIIs

    Data Protection Laws and PIIs   Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.” (https://www.gsa.gov/portal/content/104256) For example, if [...]

Read more...

Are you subject to Data Protection laws?

    Are you subject to Data Protection laws?   This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the securing of covered data, and may also require notification of victims and governmental authorities in the event of a breach. Small businesses, no matter what product or service they provide, are likely subject [...]

Read more...

Ransomware Part II

    Ransomware Part II   In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.   Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear about all of the time. Update your OS, software, and apps whenever a new release or patch is released. Do this ASAP. Some patches may be released solely as a result of the discovery [...]

Read more...

Ransomware part I

    Ransomware part I   The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. One of the most troublesome has been the development of ransomware. (FYI. Ransomware isn’t actually all that new– some version has been around for decades)  Ransomware is a type of computer virus that [...]

Read more...