Being audited for your ISO quality certification (whether to acquire such or maintain it) can be a stressful experience for many companies and teams. It instills many worries and is usually viewed as a negative process--but it’s far better to remember that it’s performed to ensure the quality of your internal processes to improve your customer
From Westlaw to Word, your law firm’s digital operations help advance client interests. While you work to protect your clients in the courtroom, clients are increasingly asking whether you also protect their data in the cyber arena. Law firm data presents a lucrative target - law firms are often viewed as “one-stop shops” for attackers – with
When it comes to the safety of your data and technology systems, it’s vital that your organization recognizes the reality of the “information security lifecycle.” By its very name, the info security lifecycle indicates that true information security is a process, not a “one and done” solitary project. Information security has no end-point, and
Security penetration testing (also known as pen testing) is often mixed up with the concept of vulnerability scanning for a corporate network. To clarify, vulnerability scanning is simply when cybersecurity professionals assess digital infrastructure and systems to find points of potential access or vulnerability.
On the other hand, security
Imagine: You receive an email from your company payroll department. The email confirms your request to change your direct deposit details for your most recent paycheck. You see that the paycheck has been deposited into a new account. The message indicates that your account has been successfully updated. One problem — you never submitted such a
Watch almost any movie from the 90s or early 2000s dealing with computers and you will see a highly stylized version of “hacking”. The scene will probably feature a t-shirt or hoodie-clad “hacker” sitting in a basement, surrounded with computer screens and green text. Cue to a closeup of the hacker furiously typing while green text scrolls down
Today’s data-centric businesses rely on a secure cyber environment to operate within. If you are a small firm, you may task contractors or your general IT support staff to handle your security needs. Mid-size to large firms, however, most likely employ an information security officer (ISO), also known as a Chief Information Security officer, or
A storm is on the horizon and if you are a part of the healthcare industry, prepare for rough seas. This storm, without rain or thunder, is digital and presents an even more burdensome proposition for healthcare organizations: the mass digitization of health and medical records (collectively, “EHRs”). In adopting new technologies to digitize
For lawyers who may juggle a morning court appearance followed by an afternoon spent inside corporate boardroom meetings, the issue of cybersecurity may seem a distant, low priority. However, law firms should emphasize cybersecurity as a top concern because of the sensitive information they have to handle, both inside and outside of the courtroom.
The American Bar Association has been calling attention to cybersecurity for its members for quite some time now. They’ve gone so far as to state, “It’s when not if, a law firm or other entity will suffer a breach.”
It’s their job to keep members informed and help them, and we applaud them for raising awareness of cybersecurity for their members.