Archive | Security RSS feed for this section

Top 5 Security Tips for Smartphones

-By Sharon D. Nelson, Esq. and John W. Simek Nelson and Simek have been frequent presenters at ABA TECHSHOW. Nelson served as Chair of the 2006 TECHSHOW Planning Board. Together, they are the principals of Sensei Enterprises. At TECHSHOW 2015, Simek will be co-presenting “Pocket Confidential – Securing and Protecting Information on Lawyers’ Mobile Devices,” […]

Encryption: Its Time Has Come

By Sharon D. Nelson, Esq. and John W. Simek Nelson and Simek have been frequent presenters at ABA TECHSHOW. Nelson served as Chair of the 2006 TECHSHOW Planning Board. Together, they are the principals of Sensei Enterprises. At TECHSHOW 2015, Simek will be co-presenting “Decrypting Encryption – Gaining Competence on Encryption for Your Practice,” with David […]

Increased Security and Productivity Come to iOS Devices Using Google Apps via Integrated Mobile Device Management

Google recently released a Mobile Device Management (MDM) tool for iOS devices that access cloud-stored data in Google’s paid Apps for Work (Education and Government) cloud productivity suites. iOS Sync for Google Apps integrates existing Google mobile apps for iOS devices with native device management features built into iOS to give administrators more control over […]

Two-Factor Authentication – Another Reasonable Step to Secure the Information Entrusted to You

Title: Two-Factor Authentication – Another Reasonable Step to Secure the Information Entrusted to You Speaker: Ivan Hemmans, David Ries Date: Thursday, April 16 Time: 4:00 – 5:00 Track: Security Topic Level: Beginner   Description According to Google, “Passwords are Dead.” So how do you effectively protect the digital information that’s been entrusted to you by […]

Cleaning Up A Data Leak – Yes, It Can Happen To You!

Title: Cleaning Up A Data Leak – Yes, It Can Happen To You! Speaker: Kenneth Lyons, Lincoln Mead, John Jelderks Date: Thursday, April 16 Time: 2:00 – 3:00 Track: Security Topic Level: Intermediate/Advanced   Description “Data leakage” occurs when information within a firm is sent to an external recipient without authorization, which may or not be […]

Decrypting Encryption – Gaining Competence on Encryption for Your Practice

Title: Decrypting Encryption – Gaining Competence on Encryption for Your Practice Speaker: John Simek, David Ries Date: Thursday, April 16 Time: 10:30 – 11:30 Track: Security Topic Level: Beginner/Intermediate   Description Do you encrypt your e-mail when communicating with a client? Do you encrypt client files on your laptop? How can you ensure that the digital […]

Your Information Is Digital and YOU Need to Know Digital Security

Title: Your Information Is Digital and YOU Need to Know Digital Security  Speaker: Matt Kesner, Kenneth Lyons Date: Thursday, April 16 Time: 8:30 – 9:30 Track: Security Topic Level: Beginner   Description You didn’t attend law school to learn about digital security, but now you’re required know it. Many clients are becoming concerned about the technology […]

Fighting Back: Tools for Tracking Hacks to Secure Your Practice

-By Chris Ries, David Ries, and John Simek (adapted from the written materials for their upcoming”Fighting Back: Tools for Tracking Hacks to Secure Your Practice” session during ABA TECHSHOW 2014) Chris Ries currently works for Oracle’s Java Vulnerability Team, where he focuses on software security. Before joining Oracle, he was a Senior Information Security Engineer […]

NSA Responds to ABA President’s Letter: “Committed to the Rule of Law”

– By Sharon Nelson and John Simek Nelson and Simek have been frequent presenters at ABA TECHSHOW. Nelson served as Chair of the 2006 TECHSHOW Planning Board. Together, they are the principals of Sensei Enterprises. At TECHSHOW 2014, Simek will be co-presenting “N.S.AY What? Firm and Client Data Security & Encryption in the Age of Monitoring,” with […]

Creating a Digital Island

From an upcoming article from the Law Practice Magazine. Stories about government and business monitoring of citizens has fanned interest in what can be done to remain anonymous. Attorneys are understanding and expect that when they visit a website their location, recent browsing history and interactions with other sites may be recorded. Less understood is […]