Skip to main content

Not Found
On Demand

Faculty:
Sharon D. Nelson, Esq. |  John W. Simek
Duration:
1 Hour 1 Minutes
Format:
Audio and Video
Short Description:
One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees. This is very important training

Not Found
Books

Author:
Sharon D. Nelson, Esq. |  John W. Simek
Publication Date:
Jan 07, 2016
Short Description:
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.

Not Found
On Demand

Faculty:
Sharon D. Nelson, Esq. |  John W. Simek
Duration:
1:04
Format:
Audio and Video
Short Description:
Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating a

Not Found
On Demand

Faculty:
Cynthia Sharp, Esq. |  Becky Howlett, Esq
Duration:
1 Hour 3 Minutes
Format:
Audio and Video
Short Description:
Do you control your digital life or does it control you? Whether texting, emailing, posting on social media, or browsing the Web, many people are at the mercy of their digital devices. Indeed, Internet addiction is on the rise and is linked to mental health concerns like depression and anxiety. In 2019, the average American checked their phone 96 times a day. By the end of 2021, that figure ...

Not Found
On Demand

Faculty:
Sharon D. Nelson, Esq. |  John W. Simek
Duration:
1 Hour 2 Minutes
Format:
Audio and Video
Short Description:
In 2021, 37% of all businesses were hit by ransomware attacks. Only 57% of businesses are successful in recovering their data using a backup. Out of all ransomware victims 32% pay the ransom, but they only get 65% of their data back. Recovering from an attack cost businesses $1.85 million on average in 2021. Scary stats. Today’s ransomware...

Not Found
Books

Locked Down

Practical Information Security for Lawyers

Author:
Sharon D. Nelson, Esq. |  John W. Simek
Publication Date:
Aug 07, 2016
Short Description:
In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? This second edition of Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget. Written in clear, non-technical language that any lawyer can understand, this book will help you:

Not Found
On Demand

Faculty:
Jennifer Ellis, Esq.
Duration:
1 Hour 2 Minutes
Format:
Audio and Video
Short Description:
Your Data Probably Has Been Stolen. Wondering How to Minimize the Chances of it Happening Again? Like everyone else, lawyers rely heavily on technology to store information. In addition to the everyday concerns we all have regarding the potential loss or theft of our information, lawyers have the added ethical responsibility of maintaining client confidentiality.

Not Found
On Demand

Faculty:
Daniel J. Siegel, Esq.
Duration:
1 Hour 1 Minutes
Format:
Audio and Video
Short Description:
Ever since law firms began using computers, there have been concerns about whether attorneys must or should use special security measures, like encryption, to protect confidential and sensitive information. Changes in ethical and procedural rules, including requirements that lawyers must (1) be technologically competent and (2) redact court filings, highlight the need for lawyers to be proactive w

Please wait ...

Back to Top