Have any of your readers experienced data theft? If so, did it happen via an Internet connection? Or was a computer simply taken?
Business information is so important that your readers guard theirs carefully. Keep them up-to-date by giving them articles detailing the latest developments in security.
For more ideas, read these articles:
- Sideways technology explanations
- Evaluating ethical technology use by outside (law) firms
- Printers invaluable but can be targeted by hackers
- In a digital world, paper still matters to law firms
- Right tools crucial to keep mobile data safe
- The consequences of forwarding suspicious emails
- Finding a fit for virtual desktops in your firm
- Troubleshooting a Mac: Beware of Third-Party Utilities
- What a phone scam sounds like
- Mobile devices gaining importance in probes
- Terms and Conditions May Apply
- Hosted solutions shift expenses away
- Prevent unwanted software activity on your computer
- Beacon technology finding footing in Canada
- Email and healthy skepticism
- Hacking the connected car
- Securing the gateway to confidential information
- Creating a guest account on your computer
- Data disasters are waiting to happen
- The virtual deal room is now more advanced
- Tablets becoming better tools thanks to useful apps
- Quality work deserves a quality website
- Passwords for polyglots
- What the end of XP means for your firm
- My website has been "unhacked"
- Wearable technology raising many legal concerns
- Creating better passwords
- My website has been hacked
- Who watches your browsing?
- Permanently deleting computer files
- To make sense of big data, look inward
- Smartphones offer lawyers many options
- Sharing a computer
- Smartphones improving, making choice tougher
- Facebook spam
- A world of extras available to make your (WordPress) site better
- Social networks at work - yes or no?
- Let MIT map your life
- Thoughts on the humble web browser
- A cost-effective way to build a business website
- 10 smartphone security tips
- Pulling text out of PDFs
- Securing your LinkedIn account
- Fine print in the clouds
- Protection begins with assessment of access
- Don’t let digital assets R.I.P.
- Passwords: a story with legs
- Protect your information: lie
- Some tips to get you wired, and secure
- Laptop safety tips
- Time to BYOD — bring your own device
- Understanding browser cookies
- Signing PDFs without printing them
- Basic online fraud prevention
- Don't be a phish
- Hiding passwords?
- Don’t become a zombie!
- Don't open your computer to strangers
- Wrangling passwords
- Lawyers wary of new technology (cloud computing)
- Secure web surfing, take two
- Social media and your insurance rates
- Cloud Computing for Data Backup, Storage and Protection
- Smartphones: lighter than laptops
- Adobe Acrobat tips for lawyers
- Passwords... sigh
- Back up your important information
- Online tools can deliver, but choose wisely
- Software-as-a-service fills market niche
- Illegitimate software – don’t go there!
- Feeling insecure (about your smartphone)?
- The Google-friendly lawyer
- Use your firewall
- Do Macs need anti-virus protection?
- Routers can improve computer security
- Safer web browsing
- Updating to Windows 7 has perks, drawbacks
- Ensuring smartphone security
- Woodbine Goes Wireless
- Judges get with the times on information security
- Draft, edit documents in real time
- Cloud Cover: Software as a Service enables virtual law practice management
- Properly Redacting Documents Crucial
- Practicing Law with SaaS
- IT code of conduct: CBA drafts new guidelines for being efficient and ethical
- How to Secure Your Laptop Before Crossing the Border
- Computer forensics: tips for handling electronic evidence
- Web application security
- Outsourcing/offshoring
- Physical Network Security
- Wireless Exploits
- Wireless Networking -- Opinion
- Managed Security Systems