Protecting small firms from computer disasters
Cart 0

Blog — protection

Be a Digital Estate Planning Hero

protection technology

Be a Digital Estate Planning Hero

You can help those close to you minimize the potential problems. A few steps taken in advance can avoid stressful, time-consuming distractions...

Read more →


A Practical Cybersecurity Checklist for Your Small Firm

cybersecurity protection

A Practical Cybersecurity Checklist for Your Small Firm

Streamlined for small businesses, the Cybersecurity Toolkit gives practical advice and how-to's you can follow to reduce your risks. You don’t need to be a technological whiz...

Read more →


Exposure of Your Clients' Social Security Numbers and More

breach protection

Exposure of Your Clients' Social Security Numbers and More

Criminal hackers are regularly targeting smaller law firms as well as larger ones. The ten-lawyer firm of Cohen Cleary was hit with litigation by clients that alleges: [T]he “massive and preventable cyberattack” was a direct result of the firm’s failure to implement sufficient data security practices to safeguard consumers’ sensitive information, which the law firm allegedly stored in its systems unencrypted and unprotected. You are not safe enough if you rely solely on your firewall, computer passwords and antivirus software to protect sensitive client information. Cyber criminals struck the fourteen-lawyer firm of Spear Wilderman, specialists in representing labor unions. Their stolen...

Read more →


Don't Get Locked Out by 2FA

hardware password protection

Don't Get Locked Out by 2FA

Two Factor Authentication (2FA) or Multi-Factor Authentication is critical to keep you safe. So, I'm writing again on this topic. You are smart to use two-factor identification (2FA) to protect your accounts. Without it, you face serious hassles and financial risks from data breaches. Setting up multiple ways to recover from problems with 2FA will ensure you won't get locked out of your accounts. Get a code from your phone. Unlock a website. Authenticators Authenticators cleverly lock out thieves and let you in. You put an authenticator app on your mobile phone. When you log in to a website that...

Read more →


Cascading Hacker Break-Ins

crime extortion protection

Cascading Hacker Break-Ins

Recent events highlight the critical role played by hardware security keys. Your online accounts may be vulnerable even if...

Read more →