Posts Tagged information security

Prevent unwanted software activity on your computer

All types of malware, from viruses to trojan horses to bots and so on, aren’t particularly mysterious. They’re merely pieces of software. They worry people since they do things to computers their owners don’t want done. Security-conscious computer users have already adopted good habits. They don’t click

Read more

Beacon technology finding footing in Canada

Smartphone-toting film, music and technology fanatics who converged on Austin, Texas, in March for South by Southwest (SXSW) got to connect with the festival and each other a little better than in previous years. The SXSW Go mobile app responded to more than 1,000 beacons deployed at event

Read more

Email and healthy skepticism

For a moment, disregard the message at the top of this email, the one that says “You marked this message as Junk Mail.” (I did that before realizing I could craft a blog post from this email.) Does this message look legitimate to you? How would you handle it?

Read more

Hacking the connected car

Insight into a new threat to auto owners and drivers Today’s cars are computers on wheels. Like their stationary cousins, connected cars run millions of lines of code every day, and that technology delivers a better driving experience. There’s a flip side to progress: like computers, today’s

Read more

Securing the gateway to confidential information

Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of

Read more

Creating a guest account on your computer

Do you let other people use your computer? It’s a reasonable thing to do. Guests at your office might need directions to their next destination. House guests might want to check their email. That said, you might be letting them check your own email, or contact information, or calendars, or

Read more

Data disasters are waiting to happen

Having a recovery plan is indispensable for your system’s inevitable crash Ben Sapiro well knows the meaning behind the metaphor “like closing the barn door after the horse escapes.” When lawyers call him about disaster recovery, it’s usually because something has already happened. “Very often, questions come after

Read more

The virtual deal room is now more advanced

Used as data rooms, lawyers can share confidential information. Physical “deal rooms” house documents pertaining to confidential activities such as mergers and acquisitions. Access to such rooms is controlled. No photocopiers are found within, and no cameras allowed inside. Brock Smith, a Vancouver-based partner in the technology

Read more

Tablets becoming better tools thanks to useful apps

Each lawyer in Russell Alexander’s firm has an iPad. The founder of Russell Alexander Family Lawyers has been using one since Apple Inc.’s tablet debuted four years ago. Donna Neff, founder of Neff Law Office Professional Corporation, started her tablet experience on an iPad 2, a device

Read more

Quality work deserves a quality website

Does your law firm’s website reflect your firm accurately? Does the content on the site mesh with your firm’s work and history? Do pictures of offices and people on the site match your actual offices, lawyers and staff? If you answered yes to these questions, congratulations. Your

Read more
Page 2 of 1012345...10...Last »