Blog

cybercrime

Security Awareness Tip of The Day: Be Cautious of Cyber-Criminals

0 Category: technology Tags:

The term “cybercrime” is usually referred to as any criminal offense committed against or with the use of a computer or computer network. A cybercrime incident can lead to loss of business and consumer confidence, financial loss, productivity loss, and even loss of intellectual property. If you become a victim of a cybercrime, you should report the incident to the appropriate law enforcement authorities. Depending on the scope of the crime, the appropriate agency may be local, state, federal, or even international. Report a cybercrime to: Department of Justice: Reporting Computer, Internet-Related, or Intellectual Property Crime Federal Bureau of Investigation: Internet Crime Complaint Center (IC3) For more information on preventing…

Continue reading

Security Shredded Paper

Security Awareness Tip of The Day: Hardcopy and Electronic Data Must Be Disposed Properly

0 Category: technology Tags:

Hardcopy and Electronic Data Must Be Disposed Properly. Wipe Electronic Data From Devices Completely and Shred All Hard Copies. Data that is not disposed of properly could be recovered or accessed by a malicious user. For electronic devices, special data wiping procedures must be used to ensure that data is completely removed from the device. For hard copies, documents must be shredded to ensure that they are properly destroyed. For More Information: Information Security: What to Shred at Work and Home 7 Disastrous Ways to Deal With Old Hard Drives OUCH! | December 2016 Newsletter: Securely Disposing of Your Mobile Device 6 Ways to Work Smarter – and Improve Security…

Continue reading

successful-law-practice

Client Persona

0 Category: management

Guest post by Lawyerist.com When you are trying to build—or expand—a law business, you need to think about what kind of people you want to help. Sometimes lawyers do that by imagining an ideal client. Not ideal as in imagining an absolutely perfect and well-behaved and affluent client, but ideal as in building a client persona that encompasses all the traits of the types of clients you expect to serve. Building that ideal client is at the heart of client-centered marketing. It isn’t just imagining who you want to work with. It’s about understanding their pain points and their goals. It’s about understanding both why they seek out a lawyer…

Continue reading

the-weather-channel-access-permission-510px

Security Awareness Tip of The Day: Is That App Giving Away Your Privacy?

0 Category: technology Tags:

Be careful when you install apps on your mobile device. Many apps want more permissions than actually needed for their function. For example, some flashlight apps want access to your contacts. Why? Usually for marketing purposes to build a better profile on you and your friends. Don’t install apps that require excessive permissions. Also, always install apps from a trusted source. This helps ensure the app isn’t fake or malicious. For more information, please visit: Apps to Help You Shop in Stores Control your app permissions on Android 6.0 and up How to Manage App Permissions on Your iPhone or iPad Click here for more security tips and resources Cyber…

Continue reading

social media malware

Security Awareness Tip of The Day: Stay Safe on Social Networking Sites

0 Category: technology Tags:

Social networking platforms (such as Facebook, Twitter, Instagram, and Snapchat) are used by billions of people each day. It’s important to realize that while social media connects you with your friends, they can also increase your exposure to individuals with less-than-friendly intentions. What Can You Do to Protect Yourself? Make sure your computer is protected with anti-virus software. Never assume you are in a trusted environment. Be cautious of how much personal information you make public. Be cautious of any third-party applications. Review all privacy policies. Keep all software up-to-date. Create strong, unique passwords. Be suspicious. For More Information, please visit: US-CERT Cyber Security Tips – Staying Safe on Social…

Continue reading