Sharon Nelson and John Simek | Release your inner gamer and "shoot” for the highest possible Microsoft Secure Score for your firm. Here are recommended actions.
Sharon Nelson and John Simek - January 30, 2023
Tom Lambotte | You're going to be considered a suitable target for a cyberattack if you tick these checkboxes.
Tom Lambotte - December 22, 2022
Common questions about moving your systems and data to the cloud.
Mark Khazanovich - December 20, 2022
Sharon Nelson and John Simek, with Michael Maschke | You may be small, but you still hold the valuable data of many people and small businesses.
Michael Maschke, Sharon Nelson and John Simek - October 25, 2022
Cybersecurity Trends Report | The number of law firms with cybersecurity policies and IRPs is far too low.
Michael Maschke, Sharon Nelson and John Simek - October 22, 2022
Tom Lambotte | You're going to be considered a suitable target for a cyberattack if you tick these checkboxes.
Tom Lambotte - September 29, 2022
Tom Lambotte | Cybercrooks have their favorite methods of stealing data — here's how to stop them.
Tom Lambotte - August 17, 2022
Sharon Nelson and John Simek, with Michael Maschke | How many apps have access to your Contacts? Here's an ethics problem most attorneys don't know about.
Michael Maschke, Sharon Nelson and John Simek - July 6, 2022
Tom Lambotte | You need multiple layers of security to keep your law firm safe from cyber-bandits.
Tom Lambotte - July 1, 2022
Tech Tips | Advice from Julie Bays, Brett Burney, Tom Lambotte, Sharon Nelson and John Simek, Catherine Reach, Camille Stell and Juda Strawczynski.
Joan Feldman and Joy White - May 18, 2022