Blog

Blog

Cyber Security: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

5 Reasons Your Legal Firm Should Have a Penetration Test ASAP

Legal firms face a range of security threats, from theft of sensitive data to malware that can wreak havoc on company computer systems. Penetration testing allows legal firms to test their information security systems to ensure they can stand up to the latest threats. The official definition of a penetration test is that it is a planned, legal

Throwback Thursday: Revisit Old Viruses at the Online Malware Museum

In these times of mega-hacks and massive data breaches,  technology risk assessment  has become a fact of life for every business. In comparison to automated botnets, the “good old fashioned” human hacking of yesteryear seems quaint, even a little nostalgic. Do you remember the malware and viruses from the 1980s and 90s? The Online Malware Museum

Your 4-Step Guide to Security Budget Planning for 2016: Part 2

Once again, it’s time to plan your security budget for the next year. In our last post, we discussed planning and implementing as the first two steps of planning your 2016 security budget. Now, let’s look at the final two steps: execution and analysis.

 

Execution

Successful execution of a security plan involves detecting new risks and monitoring

Your 4-Step Guide to Security Budget Planning for 2016: Part 1

You don’t have to be overwhelmed planning your IT risk management for 2016. Simply follow the four steps outlined over these two posts to create your 2016 budget. 

Planning

First, define the security policies and controls that you’ll use to protect your company’s assets. As an example, you might implement the security policy “employees

3 Common Cybersecurity Structures in the Legal Industry: Which One Are You?

You’ve all seen the headlines - big company data breaches, foreign hackers, databases stolen. You can’t make it a day anymore without the next information security headline.
It can be scary to some, difficult to understand for many, and it’s the fastest moving target in the business world today.  So, what should a firm like yours do about it

3 Steps to Improve Your Firm’s Information Security Policy

Improving the information security policy for your firm can be condensed down to three simple steps. These are the most common problems seen with firms and practices across the country, and they're easy for you to fix.

  

1. Realize the prevalence of the cloud

It's very common for the people writing information security policies to not be

How to Protect Against Employee Data Exposure in Your Legal Firm

Employee data exposure in the legal industry can leave employees vulnerable, lead to identify theft, and jeopardize the integrity of a legal office. That’s why it’s important for you to take the necessary steps to protect against data exposure as well as understand the techniques hackers use in order to implement successful countermeasures. This