-
Not finding what you're looking for? Try another search.
-
Introduction to Cybersecurity: Awareness & Prevention
…Steven Teppler, CDPSE, is a partner at Mandelbaum Barrett, and Chair of the Firm’s Privacy and Cybersecurity practice group, as well as our Chief Cybersecurity Legal Officer. Steven focuses his…
-
Unexpected Threats to Cybersecurity/Confidentiality: The SEC and ChatGPT [Guest Post]
…creating malware for free. Want some more troubling cybersecurity news? A February survey from cybersecurity company BlackBerry shows that, of 1500 cybersecurity experts, 74% said they worried about ChatGPT aiding…
-
Sharon Nelson and John Simek of Sensei Enterprises, Share Cybersecurity and Technology Advice for Small Firms
…cybersecurity dangers and legal technology software. Sensei Enterprises, Inc. is a nationally known digital forensics managed information technology provider, and managed cybersecurity firm in Fairfax, Virginia. Sharon D. Nelson, Esq.,…
-
Cybersecurity Checklist for Law Firms
AUTHOR Timothy D. Shields, Ed.D., Esq. | 2021 – 2024 Member, The Florida Bar’s Standing Committee on Technology Cybersecurity is the practice of protecting critical systems and sensitive information from…
-
Cybersecurity & Infrastructure Security Agency (CISA) Resources [Guest Post]
OVERVIEW As the primary cybersecurity defense agency for the nation, CISA is prepared to assist organizations in preparing for, responding to, and minimizing the effects of cyberattacks. Through its Shields…
-
Cybersecurity for Lawyers: How to Keep Your Firm’s Information Safe
Course Number 5523 CLE Approved for 1.0 hours of General CLE Credit including 1.0 hours of Technology Description Learn how to protect your firm’s most sensitive information. Cybersecurity is more…
-
Demystifying Cybersecurity for Law Firms
Course Number 3543 CLE Approved for 1 hour of General CLE Credit and 1 hour of Technology. Description Cybersecurity is a very real danger that law firms—let alone all industries—face…
-
Cybersecurity for Smaller Law Firms: Practical Advice for Protecting Your Firm (and Your Own Finances) from Online Threats
COURSE NUMBER 6628 CLE Approved by The Florida Bar for 1 hour of General CLE Credit including 1 hour of Technology CLE credit. DESCRIPTION Cybersecurity is THE hot topic these…
-
Cybersecurity for Lawyers: Steps to Ensure Your Information is Protected
…media. ABOUT THE AUTHOR John Giantsidis, JD, M.Eng is the President of CyberActa, a boutique consultancy empowering medical device, digital health, and pharmaceutical companies in their regulatory, cybersecurity, privacy, data,…
-
The Human Aspect of Cybersecurity: Cautionary Tales to Mitigate Risk – Social Engineering
…protect your firm. Learn about some of the newest threats to cybersecurity (social engineering) and how you can protect your firm and your clients’ information. Learning Objectives: How cybercrime can…
-
Cybersecurity and Data Privacy for Lawyers
…hour long presentations. Those presentations are: Vulnerable Vendors: The Critical Role of Service Providers in Law Firm and Corporate Legal Department Cybersecurity Cybersecurity is only as strong as your weakest…
-
What Lawyers Need to Know about Cybersecurity
…this episode of the Florida Bar Podcast, hosts Christine Bilbrey and Karla Eckardt talk to Al Saikali about how lawyers should prepare their firms for different types of cybersecurity threats….
-
16th Annual National Cybersecurity Awareness Month Begins Today
…1, 2019 – The 16th annual National Cybersecurity Awareness Month (NCSAM) kicks off today with a new message to Own IT. Secure IT. Protect IT., reminding everyone of the role…
-
LegalFuel Speaker Series: Cybersecurity for the Everyday Lawyer
…treat cybersecurity as a core element of their legal practice. How much protection you need depends on the state of your technology systems, legal considerations such as applicable ethical rules,…
-
5 Cybersecurity tips to Help Keep Your Client’s Data Safe [Guest Post]
…Baradat started The Baradat Group, an innovative business and IT consulting company that provides law firms with assistance in digital forensics, electronic discovery, cybersecurity, litigation preparedness and law office technology….
-
Cybersecurity and Email Encryption 101 for Lawyers
…Do you encrypt your emails containing sensitive information? Lawyers, it’s time to become knowledgeable on the dos and don’ts of cybersecurity and secure messaging. Florida attorneys have an ethical obligation…
-
Cybersecurity Concerns of Remote Work
Guest Post by: William Gamble, Member, The Florida Bar Standing Committee on Technology While there are many businesses negatively impacted by the COVID-19 pandemic, hacking isn’t one of them. Hackers…
-
Cybersecurity for Trust Accounting
Monitor your trust account daily Check your account regularly to make sure all transactions posted are ones you authorized. Report any fraudulent or suspicious activity immediately. Create a strong password…
-
Cybersecurity 101 For Florida Attorneys
Open up any newspaper and you will not have to read far to find a headline on the latest security breach. Privacy Rights Clearinghouse reports that between 2005 and March…
-
Reducing Your Cyber Risk Exposure
…as well as our Chief Cybersecurity Legal Officer. Steven focuses his practice on pro-active, preventive and remedial cybersecurity and privacy work for clients, as well as advising on potential class…
-
Ethical Obligations – What Must Lawyers Do to Maintain Privileged Information and Comply with Applicable Regulations?
…B. Florida Bar LegalFuel Resources LegalFuel has many articles, CLEs available on its website or via YouTube, and podcasts dealing with cybersecurity. See https://www.legalfuel.com/category/technology/cybersecurity/ to access them all. VII. Credits…
-
Mind Games Cybercriminals Play with Law Firm Employees [Guest Post]
…love that quote from Corey Nachreiner, the CSO of cybersecurity firm WatchGuard. We do of course make logging in all too easy. Many law firms do not have an out-processing…
-
How Florida Lawyers Can Protect Data [Guest Post]
…to revisit choices necessary for launching a successful practice. Cybersecurity Awareness Month October is Cybersecurity Awareness Month, so there is no better time to evaluate your firm’s cybersecurity plan. The…
-
Ransomware – Protect Your Data or Pay the Price
…– Ransomware – Protect Your Data or Pay the Price SPEAKER BIO Joelle Dvir is an associate in McDonald Hopkins’ national Data Privacy and Cybersecurity Group. She is certified by…
-
Ransomware Guide
…cybersecurity, such as those related to the permitted use of applications and devices, the use of public Wi-Fi, security in the workplace and mobility or the password policy. How does…
-
Holidays and Weekends: Prime Time for Cyberattacks [Guest Post]
…cybersecurity and digital forensics services from their Fairfax, Virginia firm. jsimek@senseient.com. Michael C. Maschke is the CEO/Director of Cybersecurity and Digital Forensics of Sensei Enterprises, Inc. He is an EnCase…
-
Protecting Your Files: Understanding How to Securely Store & Share Files in the Cloud
…CLE credit. Course #5660. REFERENCED RESOURCES: LegalFuel Cybersecurity Resources FTC’s Cybersecurity for Small Business AXEL.org AXEL Go, a secure cloud storage and file-sharing application 20% off Florida Bar Member Discount…
-
All Those Tech Questions You’ve Been Afraid to Ask
…Digital Documents & File Retention LegalFuel Paperless Resources How long should I keep closed files? Ethics Informational Packet on Closed Files Cybersecurity & Data Breaches LegalFuel Cybersecurity Resources Phishing Ransomware…
-
If U.S. Essential Infrastructure is Brought Down, Is Your Law Firm Prepared? [Guest Post]
…and Sharon provide legal technology, cybersecurity and digital forensics services from their Fairfax, Virginia firm. jsimek@senseient.com. Michael C. Maschke is the CEO/Director of Cybersecurity and Digital Forensics of Sensei Enterprises,…
-
How to Stop Hackers with Honey & Sand
…a solid, well rounded security strategy leveraging a defense-in-depth approach Presenter Bio: Nick Lockard has over 20 years’ experience in IT and Cybersecurity. Nick holds numerous industry leading certifications including…
-
NSA: Working from Home? Select and Use Collaboration Services More Securely
…To read more, check out NSA’s Cybersecurity Advisories & Technical Guidance at nsa.gov/cybersecurity/ See Original News Release Additional Resources The Florida Bar’s Standing Committee on Technology Selected Data Privacy Laws…
-
AI’s Impact on the Future of Law: Will Lawyers Survive? [Guest Post]
…12 proposed titles in return, all of them credible as well as catchy. ChatGPT takes the world by storm, including the cybersecurity world We have been blown away by the…
-
Legal Cloud Computing Association Publish First ‘Cloud Security Doctrine’ for Law Firms
…to address cybersecurity concerns and implement best practices for security into their joint operations. LCCA members each commit to using these security standards within their companies and services. “The legal…
-
Social Media Applications Could Contain Malware
…For more information: Social Media Security Tips and Tools to Mitigate Risks 5 Surprising Cybersecurity Risks on Social Media StaySafeOnline.org OUCH! Newsletter Cyber Tip of the Day from Inspired eLearning…
-
Cyber Protection for Law Firms [Guest Post by Member Benefits, Inc. and Coalition]
…Florida Bar Cyber Resource Gallery The team at Coalition brings together in-depth technology, cybersecurity, and insurance expertise to assist organizations in the prevention of digital risks. Click Here to View…
-
What You Need To Protect Your Firm From Cyber Threats [Guest Post]
…protected in 2018 and beyond. Learn more about what cyber-security insurance can do for you and your business. To view more resources on cybersecurity visit: Cyber Protection For Law Firms…
-
DOJ on Ransomware
…digital evidence, search and seizure of computer related evidence, investigation of child exploitation cases, incident response, identity theft and cybersecurity. RESOURCES CISA MS-ISAC Ransomware Guide_Sept. 2020 OFAC Ransomware Advisory_Sept. 2021…
-
What is Ransomware?
…each of us. More reading: Cybersecurity and Infrastructure Security Agency’s ransomware guide: https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C_.pdf National Institute of Standards and Technology’s ransomware risk management: https://csrc.nist.gov/publications/detail/nistir/8374/draft PC Magazine’s protection recommendations: https://www.pcmag.com/picks/the-best-ransomware-protection ABOUT THE…
-
Fraudulent Email Alert with the Subject “The Office of The State Attorney Complaint”
…resources related to cybersecurity. If you open an attachment or click a link within an email that you suspect is malicious, contact your technical support person or help desk immediately….
-
Consumer Law Meets Cyber Law: Emerging Consumer Protection Issues in Light of Digital Innovation and Technology Advancements
…– Materials Cybersecurity Law Report – After Capital One Ruling, How Will Companies Protect Forensic Reports? You must report your completed courses online using the course number referenced above. Post…
-
Emerging Technology and Transformation in the Practice of Law in the Digital Age
…Connected World Every Firm is a Target Lawyers’ Ethical Duties Regarding CyberSecurity Emerging Trends in Law Firm Cyber Crime – What Every Lawyer Needs to Know Materials 2853 – Emerging…
-
Email hack scam alert!
…to know their financial institutions and explore additional safeguards. Members can report suspicious email they receive to Abuse@floridabar.org. For tips on protecting your computer from malware, visit our Cybersecurity webpage….
-
Embracing Technology and Protecting Client Data from Your Office to Your Home
…attorneys with nationwide services related to digital forensics, electronic discovery, cybersecurity, litigation preparedness and law office technology. You must report your completed courses online using the course number referenced above….
-
Protecting Privacy on Virtual Meetings [Guest Post]
…meetings are now a constant method of communication in business and law. Advancements in technology and the slow pace of adoption of security measures remains troublesome. Cybersecurity vigilance of your…
-
How Lawyers Can Connect to Public Wi-Fi Safely [Guest Post]
…Hacker (CEH) and a nationally known expert in the area of digital forensics. He and Sharon provide legal technology, cybersecurity and digital forensics services from their Fairfax, Virginia firm. jsimek@senseient.com….
-
Thin Walls, Smart Homes, Zoom Towns & Data Breaches: 21 Things Lawyers Should Know About the Ethics of Lawyering Remotely in 2021
…should attorneys consider using in their practice? What are some of the ethical and cybersecurity considerations that attorneys need to be aware of? This webinar will frame such considerations and…
-
Reducing Litigation and Liability Risk for Attorneys
…Next? States continue to amend data breach statutes Attorneys will be held to a higher standard and expected to implement cybersecurity practices Clients will require secure communications from their attorneys…
-
Passwords 101
…passwords and utilize all the cybersecurity features available will put our clients and their private, privileged data at risk. However, with a few easy steps, anyone can secure the data…
-
Stop Important Emails from Going to Spam
…& Cybersecurity Topics (September 22, 2017). [2] Eckardt, Things You Should Know About Free Email & File Sharing Cloud Services, LegalFuel.com, Technology Cloud Computing & Cybersecurity Topics (September 22, 2019)….
-
Fraudulent Email Alert – November 30, 2016
…and links to other resources for Florida Bar members to use to protect their computers from malware. The information on the LegalFuel Cybersecurity page will be updated frequently with additional…
-
Halloween Edition: Law Office Policies & Procedures
…correspondence, scheduling, docketing, bookkeeping, accounting, file retention protocols, cybersecurity protocols, etc.); dress code, business hours, work hours, holidays, timesheets, and payroll; internal file management/access; etc. External policies include firm costs…
-
Is That App Giving Away Your Privacy?
Be careful when you install apps on your mobile device. Many apps want more permissions than actually needed for their function. For example, some flashlight apps want access to your…
-
Technology
Our world is more connected and automated than ever before. The ever-changing world of technology is evolving by the minute. It can be a lot to keep up with, especially…
-
Scan Your Computer
After you have installed an anti-virus and/or anti-spyware package, you should scan your entire computer periodically. If your anti-virus package has the ability to automatically scan specific files or directories…
-
Never Post Any Personally Identifiable Information on Twitter
Twitter is a Completely Public Social Media Platform. Never Post Any Personally Identifiable Information on Twitter. Everything you post on Twitter is made public and is indexed by search engines….
-
Social Networks Can Be Used to Spread Malware
Social Networks Can Be Used to Spread Malware. Never Click on Unknown Links or Download Files through Social Media Accounts. Links and files on social networks can include viruses and…
-
Scam Artists May Use Your Social Media to Make Their Emails More Convincing
Scam Artists May Use Your Social Media to Make Their Emails More Convincing. Remain Skeptical About Any Unsolicited Emails. Scam artists may use the information you post on social media…
-
The Ethics of Communicating with Clients Via Text Messages
…good strategy to mitigate liability Why hackers target law firms and how cybersecurity can prevent such breachesy Speaker David Buddingh is the founder of Encrypted Information Exchange, LLC, a company…
-
LegalFuel: The Practice Resource Center of The Florida Bar
…case, nor can we provide templates for pleadings. We are happy to assist with the business aspects of running a small firm, such as trust accounting, cybersecurity, obtaining liability insurance,…
-
Prominent Sacramento law firm sues for $1 million after falling prey to ransomware attack [Guest Post]
…more than $1 million alleging that, after hiring the company to provide cybersecurity, the law firm was hit with a ransomware attack. The Mastagni Holstedt law firm filed the suit…
-
Scan Your Email Messages With Antivirus Software
Viruses often infect your computer via instant messages and email attachments, especially when the attachment is an executable file. Enable your antivirus software’s auto-protect feature to automatically scan email attachments…
-
WhatsApp announces major security flaw that could let hackers access phones
WhatsApp admitted a major cybersecurity breach which enabled targeted spyware to be installed on phones through voice calls. The security vulnerability affects both iPhone and Android devices, with malicious code…
-
Common Security Myth – I Don’t Have Anything a Hacker Would Want
Yes, you do. Hackers want to control your PC to send spam, distribute malware, or help launch a denial of service attack. Hackers want your information to use for identity…
-
LLMs for Legal Tasks: Best Practices [Guest Post]
…has led teams of cybersecurity and world spanning digital forensics investigations, and has led teams in legal-software development. Co-Chair of the Minnesota Governor’s Council on Connected and Automated Vehicles, he…
-
Winning Cases with E-discovery and Artificial Intelligence
…of The Baradat Group, a law firm IT consulting company where he provides attorneys with nationwide services related to digital forensics, electronic discovery, cybersecurity, litigation preparedness and law office technology….
-
Practicing Law as a Digital Nomad
AUTHOR Michelle Garcia Gilbert, Esquire | 2021 – 2024 Member, The Florida Bar’s Standing Committee on Technology Advent of Remote Legal Practice Protocols: Remote Practice in and out of U.S….
-
Cyber Security Risk Management Resource Center for Florida Lawyers [Guest Post by Florida Lawyers Mutual Insurance Company]
Created and Provided By: Florida Lawyers Mutual Insurance Company Helpful Cyber Risk Management Resources for Protecting Your Florida Law Practice There is no greater threat facing Florida lawyers today than…
-
Cyber Attacks: Common Email Attacks to Avoid
AUTHOR Eli Mattern, Esq. | 2021 – 2024 Member, The Florida Bar’s Standing Committee on Technology Protecting client’s sensitive information is critical for any law firm. Yet every day our…
-
Be Cautious of Cyber-Criminals
The term “cybercrime” is usually referred to as any criminal offense committed against or with the use of a computer or computer network. A cybercrime incident can lead to loss…
-
Fraudulent Email Alert Regarding Unpaid Invoices
The Florida Bar warns its members that fraudulent emails regarding unpaid invoices are being distributed. We advise members not to click on any links or attachments contained within the emails and to permanently…
-
Be aware of phone and email scams that appear to be from the courts.
The Florida Supreme Court is warning of several widespread email and phone scams that try to trick people by saying they must come to a Florida state court to face…
-
Only Use Trusted Wi-Fi Networks
Only Use Trusted Wi-Fi Networks When Connecting to the Internet. Using a public Wi-Fi network not only puts your devices at risk, but also exposes your traffic to everyone else…
-
Real Estate Wire Instructions Scams
The Florida Bar continues to receive multiple reports of fraudulent activity relating to wired funds in real estate transactions. One way to protect against this fraud is for the lawyer to…
-
Two Step Authentication in Outlook
AUTHOR Elizabeth L. (Betsy) Hapner, Esq. | 2021 – 2024 Member, The Florida Bar’s Standing Committee on Technology Eighty-one percent of data breaches result from stolen or weak credentials. With…
-
US HOR Blockchain Legislation Summary Review
We thank Anessa Allen Santos, member of the Technology Law Committee of The Florida Bar, and The Business Law Section for this guest post. …
-
The Science of Working From Home
The Florida Bar Podcast welcomes Judge Robert Hilliard, Rebecca Bandy, and Jack Newton to explore their perspectives on the legal profession’s shift to remote work during the pandemic. Working from…
-
Protect the Data on Your Computer With a Cloud Backup System
Data not properly backed up could be lost forever. Protect the data on your computer with a cloud backup system. If you don’t backup your data regularly, you may lose…
-
Using The Cloud Securely
“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you….
-
Detecting Fraud
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card…
-
Tools Legal Professionals Need When Working From Home
Course Number 3907 CLE Approved for 1.0 hours of General CLE Credit and 1.0 hours of Technology. Description As more and more professionals of all stripes are transitioning to work-from-home…
-
Tips for Protecting Trust Accounts from Fraud
Fraudsters continue to target attorney trust accounts with variations of the phony cashier’s check scheme. These tips can help safeguard you and your firm against check scams and fraud: “Available…
-
Keep Sensitive Data Secure
With major data breaches being reported all too frequently, organizations are now placing increased emphasis on the security of personal, private, and sensitive information. One method of increasing security is…
-
Computer Virus and Malware Protection
The potential damage caused by computer malware, viruses and worms, should be considered by all attorneys in implementing an information security program for their firm. Prevention is key in protecting…
-
Wyoming Blockchain Legislation Summary Review
We thank Anessa Allen Santos, member of the Technology Law Committee of The Florida Bar, and The Business Law Section for this guest post. …
-
Social Engineering
A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not…
-
I’m Hacked, Now What?
Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and…
-
Alexa is Watching
AUTHOR Vanessa Ferguson, Esq. | 2021 – 2024 Member, The Florida Bar’s Standing Committee on Technology While technology can be useful in making our personal and professional lives work together…
-
Blockchain Use Cases Across 55 Big Industries
We thank Anessa Allen Santos, member of the Technology Law Committee of The Florida Bar, and The Business Law Section for this guest post. …
-
Public Wi-Fi
With the prevalence of mobile device use and on-the-go communications, attorneys must be aware of the security challenges associated with increased work mobility. An attorney’s workday often consists of answering…
-
Stop That Phish
Overview Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but…
-
How One Law Firm’s Spam Blocker Proved Costly
The Mailbox Rule is a contract law principle concerning acceptance of an offer. The rule relies on the concept that once a party places a legal document in the postal system,…
-
Securing Wi-Fi at Home
Overview To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and…
-
Creating a Cyber Secure Home
Overview In the past, building a home network was nothing more than installing a wireless router and several computers. Today, as so many of us are working, connecting, or learning…
-
Backup & Recovery
If you use a computer or mobile device long enough, sooner or later something will go wrong, resulting in you losing your files, documents, or photos. For example, you may…
-
Passphrases
Background Passwords are something you use almost every day, from accessing your email or banking online to purchasing goods or accessing your smartphone. However, passwords are also one of your…
-
Personalized Scams
Overview Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase…
-
The Impact of Blockchain Technologies: from Cryptocurrencies to Smart Contracts
Course #2851: This course has been approved for 3.0 hours of General CLE Credit including 3.0 hours of Technology CLE Credit. Blockchain technology is quickly becoming a powerful global disruptor,…
-
Message Security and the Post Email Law Firm
https://youtu.be/g5kjQNz1uOI This webinar has been approved for 1.0 hour of General CLE Credit including 1.0 hour of Technology CLE Credit. Course Number: 2676. 2016 has gone a long way to…
-
Frauds Targeting Attorney Trust Accounts
The Practice Resource Center continues to receive reports of frauds targeting attorney trust accounts. The three most prevalent types of frauds are 1) Counterfeit bank checks 2) Compromised wire instructions,…
-
Scamming You Through Social Media
Overview Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but…
-
Virtual Private Networks (VPNs)
Overview You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee…
-
Don’t Let Ransomware Hold Your Firm Hostage
Guest post by: Jim Guarnieri With the new year come new challenges- and not just the legal kind. The holidays are a fertile time for hacking attacks. As firms close…
-
Making Passwords Simple
Overview You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all…
-
Password Managers
Overview One of the most important steps you can take to protect yourself is to use a unique, strong password for each of your accounts and apps. Unfortunately, it’s almost…
-
Helping Others Secure Themselves
Many of us feel comfortable with technology, to include how to use it safely and securely. However, other coworkers, friends or family members may not feel so comfortable. In fact,…
-
Securely Using Mobile Apps
Mobile devices, such as tablets, smartphones, and watches, have become one of the primary technologies we use in both our personal and professional lives. What makes mobile devices so versatile…
-
Attorney Identity Theft
Identity theft doesn’t just apply to stolen credit cards or social security numbers. For attorneys, scammers can steal names and even bar numbers in order to trick consumers. In this…
-
Law Firm Computer System Security [Guest Post]
We thank Michael J. Molenda, ME, JD., Member of The Florida Bar Standing Committee on Technology for this guest post. The legal industry has embraced the use of technology to…
-
Staying Secure on the Road
We want you to be able to make the most of technology at all times, including when you travel. In this newsletter, we cover how you can connect to the…
-
Lock Down Your Login
The process of authentication, or proving who you are, is key to protecting your information, such as your email, social media, or online banking accounts. You may not realize it,…
-
Virtual Conferencing Safely and Securely
What is Virtual Conferencing? With so many of us now working from home, you are most likely finding yourself remotely connecting with your co-workers using virtual conferencing solutions like Zoom,…
-
Stop That Malware
You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber…
-
Securing Your Mobile Devices
Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since your…
-
What do I need to know about keeping my network secure?
Steve Hindle, Director – Global Security Operations for Sykes Enterprises provides tips on how to keep your network safe from hackers or other malicious attacks….
-
Start a Law Firm
Thinking about starting a law firm? Here’s what you need to know. Striking out on your own is a big decision and we want to make sure you have all…
-
Home
LegalFuel is The Florida Bar’s law office management department. It provides members with resources to help run the business side of their law practices with guidance on technology, trust accounting,…
-
Securing Your Mobility – How to Ethically Protect Information You Carry on Your Mobile Devices
Course Number 4078 CLE Approved for 1.0 hour of General CLE Credit including 1.0 hour of Ethics CLE Credit and 1.0 hour of Technology CLE Credit Description You’re a “mobile”…
-
Am I Hacked?
Overview Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have…
-
Privacy – Protecting Your Digital Footprint
What is Privacy? There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today’s digital world,…
-
Selected Data Privacy Laws Outline
As attorneys we understand the concept of trust, whether it is appropriately maintaining clients’ funds in a trust account or being a trusted competent advisor for our clients. The same…
-
Enabling Two-Factor Authentication Can Help You Keep Client Data Safe
Keeping your client data secure is one of your obligations as a lawyer, and keeping your personal data secure is just smart. One of the easiest ways to secure your…
-
Quick Start Guide to Data Privacy Laws
The Florida Bar’s Standing Committee on Technology developed this Quick Start Guide to Data Privacy Laws to answer basic questions on the application of privacy laws to the practice of…
-
Search Yourself Online
Overview You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new;…
-
DocuSign Phishing Campaign
DocuSign has detected an increase in phishing emails sent to some of their customers and users – and has posted alerts on the DocuSign Trust Center and in social media. The emails…
-
Phone Call Attacks & Scams
Overview When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. While many of today’s cyber criminals…
-
Top Tips to Securely Using Social Media
Overview Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all…
-
Technology Ethics for Attorneys
Course Number 3239 CLE Approved for 1 hour of General CLE Credit, 1 hour of Technology, and 1 hour of Ethics. Description If you think technology is complicated, try complying…
-
The Power of Updating
Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run…
-
Phishing
Overview Email is one of the primary ways we communicate. We not only use it every day for work, but to stay in touch with our friends and family. In…
-
Ransomware
What Is Ransomware? Ransomware is a type of malicious software (malware) that is designed to hold your files or computer hostage, demanding payment for you to regain access. Ransomware has…
-
Dark Web
Overview You may have heard the term “Dark Web” used by others or in the media and wondered “what is the Dark Web?” or “should I be doing anything about…
-
No Law Firm is Too Small for Cyber Security
Some small law firms and solo practitioners feel that their practice and available revenue is too small to invest resources into cyber security protections. In this episode of The Florida…
-
Smart Home Devices
What are Smart Home Devices? Traditionally only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However today, more…
-
Yes, You Are a Target
Overview Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from…
-
Law Practice Management and Technology for Today and Beyond
Course Number 3214 CLE Approved for 4 hours of General CLE Credit, 1 hour of Ethics, and 4 hours of Technology Description Presented at the 2019 Annual Florida Bar Convention…
-
Things You Should Know About Free Email & File Sharing Cloud Services
By: Karla J. Eckardt, Practice Management Advisor The Florida Bar’s Standing Committee on Technology has annotated The Legal Cloud Computing Association’s (LCCA) standards for lawyers to consider when conducting due…
-
How can I safely share files with a client over the internet?
Chad Burton, CEO of CuroLegal and founder of Burton Law provides tips on how to safely and securely share files with clients over the internet….