SlideShare una empresa de Scribd logo
1 de 3
7 Steps You Can Take Now to
Protect Your Data
Posted on 05/09/2016
Unless you’ve been playing ostrich, you’re likely aware that data breaches and ransomware are
about as common as Mom and apple pie. Witness the recent hack of 272 million Gmail,
Microsoft, and Yahoo! accounts.
Fortunately, there are simple steps you can take now that will help protect your
data. [With thanks and all due credit to Lane Powell’s Beyond IP Law post, The Scariest Hack So
Far, for inspiring this elucidation of their original list]:
Step 1: Start Using Encryption
For your desktop, cloud-based accounts, mobile devices – anywhere or any place you store or
transmit confidential or private information. For a thorough discussion of how to implement
encryption throughout your firm, see Encryption Made Simple for Lawyers, now
a book available for purchase on the ABA website. (Non-ABA members in Oregon can save
money at checkout by using the OSB Professional Liability Fund discount code: OSBPLF.)
Step 2: Set Up Two-Factor Authentication for Cloud Services
“The concept of two-factor authentication is that a person cannot access another user’s account
without something she knows and something she has. In the case of popular services (like
Google or Dropbox), the solution is a strong password plus a secondary code that is sent via
text to a smartphone or mobile device.” Catherine Sanders Reach, Set Up Two-Factor
Authentication: What Are You Waiting For? [Read Catherine’s post for step-by-step directions
or search Help in your cloud-based service for assistance in setting up two-factor
authentication.]
Step 3: Erect Firewalls
Firewalls sit between you and the rest of the Internet. They protect unauthorized access to
your computer by ignoring or repelling information that appears to come from unsecured,
unknown, or suspicious locations. The best firewall configuration is a one-two
punch: hardware firewall + software firewall.
Setting up a hardware firewall requires no effort on your part. While you can buy a stand-alone
appliance, hardware firewalls are now automatically incorporated into your router (the box in
your office or house installed by your Internet Service Provider).
Software firewalls are installed on your computer system like any other application, and are
also easy/breezy since they are typically built into anti-virus software. (See discussion that
follows.)
Step 4: Install Anti-Virus, Anti-Malware, Anti-Spyware Programs and Keep Them
Updated
This seems pretty explanatory, but let me add some free advice:
 Don’t disable automatic updates to your virus definition database
 Run quick scans when prompted
 Run full scans at least monthly
 Don’t ignore notifications that your software isn’t running properly
For a list of the best anti-virus utilities for PCs, see this list from PC Magazine. For a list of the
best anti-virus utilities for Macs, check out this MacWorld post. For other recommendations,
run a Google search.
My personal opinion: run far, far away from McAfee. [I really don’t give a rip that it is “now
part of Intel Security.”] First, McAfee blocked access to my work VPN (virtual private
network). There was no way to set a rule or create an exception and tech support was
incredibly unhelpful. Second, McAfee is notoriously hard to uninstall. Using Add/Remove
Programs in the Control Panel is only the first step; you must download a separate application
from McAfee to get rid of it. I mention this because McAfee tends to come pre-installed on
laptops or desktops purchased from retailers like Best Buy. What to do? If McAfee was
inflicted on you (pre-installed), get rid of it. Follow the link above for the uninstaller. Next,
buy Kaspersky. I have been very pleased with Kaspersky from day one and it has never
interfered with my VPN connection.
Step 5: Run Operating System and Other Software Updates
This also seems self-explanatory. Mac and Windows OS ship with automatic updates enabled –
don’t fuss with this. If Microsoft or Apple thinks you need a security patch, a fix, or upgrade, let
it run. The same goes for every application installed on your computer: Microsoft Office,
Acrobat DC, Quicken, QuickBooks – let automatic updates run. If you’re not sure whether
automatic updates are enabled, check Help or search the product’s website. Some programs
also allow you to manually search for updates. Acrobat DC is an example. In the menu, select
Help, and choose “Check for Updates…”
Step 6: Be Ready to Kill Your System If You Suspect a Breach
In the original post which inspired me to write on this topic, author Jane E. Brown comments:
“Consider using a “kill switch”— when suspicious events happen, the IT department should
automatically be notified and the network should shut down if no protective measures are
taken.”
I have known of events that required a kill switch. One Oregon lawyer was hacked via a
phishing email. The hacker was able to get enough information from the lawyer and the
lawyer’s system to contact clients by email and request that they input credit card information
to pay their bills. Fortunately, a few clients recognized that this request was outside the
lawyer’s usual billing process and called the office. The lawyer had to pull the kill switch and
take other steps, including freezing bank accounts. This turned out to be a smart move, as
within 24 hours the hacker also attempted to withdraw thousands of dollars from the lawyer’s
trust account.
Step 7: Lose Your Device? Lose Your Credentials.
There are some obvious times when it makes sense to reset or revoke user names and
passwords (login credentials):
 At termination
 If a network-connected device is lost
 You experience a security intrusion
 Your security, privacy, or confidential policies are breached
Final Thoughts
None of these steps are difficult, but bouncing back from a security breach is.
[All Rights Reserved 2016 Beverly Michaelis]

Más contenido relacionado

La actualidad más candente

ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksRaghu Addanki
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016Arish Roy
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?jeremyhall724
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home StaffArt Ocain
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 

La actualidad más candente (20)

IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Data security
 Data security  Data security
Data security
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 

Destacado

Destacado (15)

ESTADOS FINANCIEROS DICIEMBRE 2014
ESTADOS FINANCIEROS DICIEMBRE 2014ESTADOS FINANCIEROS DICIEMBRE 2014
ESTADOS FINANCIEROS DICIEMBRE 2014
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
To facebook στην εκπαιδευση
To facebook στην εκπαιδευσηTo facebook στην εκπαιδευση
To facebook στην εκπαιδευση
 
Presentacion de-conocimiento sesion 1
Presentacion de-conocimiento sesion 1Presentacion de-conocimiento sesion 1
Presentacion de-conocimiento sesion 1
 
อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์
 
The Continuum of Client Communications
The Continuum of Client CommunicationsThe Continuum of Client Communications
The Continuum of Client Communications
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
S08 publicación slideshare
S08 publicación slideshareS08 publicación slideshare
S08 publicación slideshare
 
HOS
HOSHOS
HOS
 
Reglamento interno
Reglamento interno Reglamento interno
Reglamento interno
 
06 evaluation
06 evaluation06 evaluation
06 evaluation
 
Reglamento interno
Reglamento interno Reglamento interno
Reglamento interno
 
Joshua Neubaum Resume
Joshua Neubaum ResumeJoshua Neubaum Resume
Joshua Neubaum Resume
 
ΑΝΤΩΝΥΜΙΕΣ ΝΕ ΕΛΛΗΝΙΚΕΣ
ΑΝΤΩΝΥΜΙΕΣ ΝΕ ΕΛΛΗΝΙΚΕΣΑΝΤΩΝΥΜΙΕΣ ΝΕ ΕΛΛΗΝΙΚΕΣ
ΑΝΤΩΝΥΜΙΕΣ ΝΕ ΕΛΛΗΝΙΚΕΣ
 

Similar a 7 steps you can take now to protect your data

The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 

Similar a 7 steps you can take now to protect your data (20)

The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Four Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer TodayFour Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer Today
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 

Más de Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineOregon Law Practice Management
 

Más de Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 
Why hiring staff pays YOU
Why hiring staff pays YOUWhy hiring staff pays YOU
Why hiring staff pays YOU
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
The ethics of crowdfunding
The ethics of crowdfundingThe ethics of crowdfunding
The ethics of crowdfunding
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

7 steps you can take now to protect your data

  • 1. 7 Steps You Can Take Now to Protect Your Data Posted on 05/09/2016 Unless you’ve been playing ostrich, you’re likely aware that data breaches and ransomware are about as common as Mom and apple pie. Witness the recent hack of 272 million Gmail, Microsoft, and Yahoo! accounts. Fortunately, there are simple steps you can take now that will help protect your data. [With thanks and all due credit to Lane Powell’s Beyond IP Law post, The Scariest Hack So Far, for inspiring this elucidation of their original list]: Step 1: Start Using Encryption For your desktop, cloud-based accounts, mobile devices – anywhere or any place you store or transmit confidential or private information. For a thorough discussion of how to implement encryption throughout your firm, see Encryption Made Simple for Lawyers, now a book available for purchase on the ABA website. (Non-ABA members in Oregon can save money at checkout by using the OSB Professional Liability Fund discount code: OSBPLF.) Step 2: Set Up Two-Factor Authentication for Cloud Services “The concept of two-factor authentication is that a person cannot access another user’s account without something she knows and something she has. In the case of popular services (like Google or Dropbox), the solution is a strong password plus a secondary code that is sent via text to a smartphone or mobile device.” Catherine Sanders Reach, Set Up Two-Factor Authentication: What Are You Waiting For? [Read Catherine’s post for step-by-step directions or search Help in your cloud-based service for assistance in setting up two-factor authentication.] Step 3: Erect Firewalls Firewalls sit between you and the rest of the Internet. They protect unauthorized access to your computer by ignoring or repelling information that appears to come from unsecured, unknown, or suspicious locations. The best firewall configuration is a one-two punch: hardware firewall + software firewall. Setting up a hardware firewall requires no effort on your part. While you can buy a stand-alone appliance, hardware firewalls are now automatically incorporated into your router (the box in your office or house installed by your Internet Service Provider). Software firewalls are installed on your computer system like any other application, and are also easy/breezy since they are typically built into anti-virus software. (See discussion that follows.)
  • 2. Step 4: Install Anti-Virus, Anti-Malware, Anti-Spyware Programs and Keep Them Updated This seems pretty explanatory, but let me add some free advice:  Don’t disable automatic updates to your virus definition database  Run quick scans when prompted  Run full scans at least monthly  Don’t ignore notifications that your software isn’t running properly For a list of the best anti-virus utilities for PCs, see this list from PC Magazine. For a list of the best anti-virus utilities for Macs, check out this MacWorld post. For other recommendations, run a Google search. My personal opinion: run far, far away from McAfee. [I really don’t give a rip that it is “now part of Intel Security.”] First, McAfee blocked access to my work VPN (virtual private network). There was no way to set a rule or create an exception and tech support was incredibly unhelpful. Second, McAfee is notoriously hard to uninstall. Using Add/Remove Programs in the Control Panel is only the first step; you must download a separate application from McAfee to get rid of it. I mention this because McAfee tends to come pre-installed on laptops or desktops purchased from retailers like Best Buy. What to do? If McAfee was inflicted on you (pre-installed), get rid of it. Follow the link above for the uninstaller. Next, buy Kaspersky. I have been very pleased with Kaspersky from day one and it has never interfered with my VPN connection. Step 5: Run Operating System and Other Software Updates This also seems self-explanatory. Mac and Windows OS ship with automatic updates enabled – don’t fuss with this. If Microsoft or Apple thinks you need a security patch, a fix, or upgrade, let it run. The same goes for every application installed on your computer: Microsoft Office, Acrobat DC, Quicken, QuickBooks – let automatic updates run. If you’re not sure whether automatic updates are enabled, check Help or search the product’s website. Some programs also allow you to manually search for updates. Acrobat DC is an example. In the menu, select Help, and choose “Check for Updates…” Step 6: Be Ready to Kill Your System If You Suspect a Breach In the original post which inspired me to write on this topic, author Jane E. Brown comments: “Consider using a “kill switch”— when suspicious events happen, the IT department should automatically be notified and the network should shut down if no protective measures are taken.” I have known of events that required a kill switch. One Oregon lawyer was hacked via a phishing email. The hacker was able to get enough information from the lawyer and the lawyer’s system to contact clients by email and request that they input credit card information to pay their bills. Fortunately, a few clients recognized that this request was outside the lawyer’s usual billing process and called the office. The lawyer had to pull the kill switch and take other steps, including freezing bank accounts. This turned out to be a smart move, as within 24 hours the hacker also attempted to withdraw thousands of dollars from the lawyer’s trust account.
  • 3. Step 7: Lose Your Device? Lose Your Credentials. There are some obvious times when it makes sense to reset or revoke user names and passwords (login credentials):  At termination  If a network-connected device is lost  You experience a security intrusion  Your security, privacy, or confidential policies are breached Final Thoughts None of these steps are difficult, but bouncing back from a security breach is. [All Rights Reserved 2016 Beverly Michaelis]