Computers are wonderful tools. Their use allows law firms to be far more efficient than they would be without such tools. That said, computers, or more properly, how computers are used can create exposure for a law firm. This presentation discusses technology traps for the attorney and information on how to avoid them. The following are brief examples of the focus of the program.
What information would be compromised if your laptop were stolen? Would client confidences such as a pending merger, social security numbers or financial information be revealed? A lost or stolen laptop could be disastrous, particularly if sensitive files were not encrypted which is so often the case.
Portable storage devices can be a real threat and this isn’t just about losing one that had confidential client information on it. The concern that I wish to raise is over the ability these devices give to someone to covertly introduce programs and/or files to, or to remove them from, the network.
At its most basic level, anyone’s passwords should be available to someone else at the firm in the event of an emergency of some sort. While there is no one right solution, we will discuss a few ideas.
We all view our smartphones as smartphones, when in fact a smartphone is really not a phone at all. I believe we are better served if we view smartphones as handheld computers with cell phone capabilities. What legal ramifications does this pose for the practicing attorney?
I do believe that attorneys as a group have a pretty good handle on the ins and outs of attorney-client privilege. It’s not an issue for me. What interests me more would be in knowing how many attorneys know if their clients get it.
Social engineering in the context of cybercrime is really about the use of psychological manipulation to trick a person into doing something that isn’t going to be in their best interests. The goal may be to gain access to confidential information, to steal personal identities or money, to gain access to computer network resources, and the list goes on.
As tech users, our actions can unintentionally circumvent the security tools that have been deployed. What we do with email, Internet browsing, downloading, social networking, and even how and where we do these things matters. Unsecured Wi-Fi is exactly that, unsecured. Just because a signal is there doesn’t mean using it is a good idea. Cybercriminals have the same ability to access that signal as you do.
Program Table of Contents:
1. Mobile Device Security
2. Portable Storage Concerns
3. The Password Headache
4. Unsecured Wi-Fi
5. A False Sense of Security with Technology
6. Social Engineering, Phishing, and Cybercrime
7. Don’t Do Stupid When Browsing the Internet
8. Social Media and the Attorney Client Privilege Warning