User login

Blog Posts

Displaying 6 - 10 of 592
Enter keywords to search the current selection of blogs
Dec
21
 

We're conducting a survey for next years webinars and guides and your input would be appreciated. Click the button below to start the survey: https://www.surveymonkey.com/r/V2FVGCS

Dec
20
 
Just today some fine folks of at Seattle University have launched the ATJ Tech Fellows program.
Some fine folks
Tech Fellows is a program that provides Law students with a ten month paid summer internship where they will be placed at a partner legal services organization. At the start of those ten weeks participants will go through a series of webinars designed to bring them up to speed on the current state of tech in legal aid, the will then be assigned to a mentor at the host organization and work on a variety of projects that sit on the intersection of tech and legal aid.
 
This is a great chance for a student who is interested in tech to spend a summer cultivating their skills while working on projects for their host. What exactly they will be working on will vary, it could be anything from automating forms to managing statewide websites.
 
Applications are now open for the summer of 2017, applications close February 15, 8pm est.
The locations you can apply to work:
 

You can apply online or download and print the application, for more information check them out on their application page.
Dec
6
 
 
Recently a friend got hit with some ransomware. He is tech savvy and still fell victim to it, after helping him deal with it I thought I’d share some some of the things I learn with you.
 
To start off let’s look at what ransomware is. Ransomware is a very simple attack, once the attacker gets access to your computer they encrypt all of your files. Once that is done they offer to give you the key to all your files in exchange for a payment within a certain amount of time. If you choose not to pay within the time then generally the price goes up, and if you never pay you never get the key from them. Ransomware is a threat to you both on a personal and organizational level, on the personal level they typically demand 300-600 dollars while at the organizational level it can be tens or hundreds of thousands of dollars, they
 
There are fortunately many ways to reduce your chances of falling victim and to mitigate the damage should the worst happen. There are two broad stratagies to dealing with ransomware, damage prevention to prevent it from ever taking hold and damage control to mitigate damage once you have been attacked. Ideally you would never need the latter but mistakes will happen eventually and it's important to know what steps to take.
 
 
Damage Prevention
Keep Up to Date
Keep all of your software up to date. One of the common ways they get into your computer is through an out of date plugin. It doesn’t matter that the exploit has been found and fixed if you haven’t downloaded the patch.
 
Lock Things Down
Limit permissions on your computer. There are lots of little things that you can close down that will limit their ability to get at your computer. If you aren’t using things like Remote Desktop Protocol disable that, and if you can operate without it disable files from running from the AppData and LocalAppData folders.
 
Show Extensions
Show hidden extensions. Sometimes malicious files arrive with the extension “.pdf.exe”. Since windows hides extensions by default that file will show as file.pdf which looks innocuous if you aren’t paying close attention. Setting windows to show extensions will make this sort of scheme much easier to spot.
 
Educate your Staff
Ultimately the main cause for failure is user making a mistake, anything from opening the wrong attachment to using a thumb drive with an infected machine and then bringing it to work. Strong education and good awareness of what to look out for go a long way to keeping things secure.
 
Damage Control
 
Backups

 
First of all you should be creating and maintaining backups anyways as part of your routine. Even without malicious intent hard drives fail and accidents happen. Being
able to simply restore from from a backup turns an attack from a huge problem to an inconvenience that takes a little time. Remember when making backups you need to make at least to backups in addition to the original and keep one of those off site. Having a portable hard drive with your backups next to your computer do little good if you lose your office in a fire or a thief steals both. It is important is to store the backup disconnected from your computer, if you leave it plugged in then ransomware will simply encrypt it too.
 
Also important is to test your backups regularly. Like any other physical medium they degrade over time, if you don’t verify them you could be in rude shock when you least expect it.
 
Immediate Damage Control
If you realize you just opened a suspect email attachment or ran a file you think contains ransomware you can limit damage if you act quickly. First of all disconnect from the internet and any networks you are on and remove and external devices like phones or external hard drives, also turn off Wi-Fi and Bluetooth. The ransomware will encrypt pretty much everything it can see so it’s important to limit its spread.
 
More Backups
After getting everything encrypted make a backup of all the encrypted files somewhere. If all else fails a way to decrypt the files may discovered at some point in the future, and in one case one of the attackers had a pang of conscience and put out a code so everyone they hit could decrypt their files.
 
Check for Solutions
A few versions ransomware have had some weaknesses in their encryption that have allowed third parties to crack them, check out these resources to see if is an option for you.
 
 
Wrapping Up
In the end while getting hit with ransomware can be devastating there are a few easy steps that can drastically reduce the risk of getting hit and the severity of the damage if that slim chance happens. If you want to learn more check out this guide created by KnowBe4. It is well written and covers the topic in more depth.
 
As it happens my friend was was lucky, he had been hit with Coinvault and the decrypter linked to above managed to fully decrypt all of is files. You can bet that he has taken some of these steps I listed above and should it happen again he will be prepared.
 
 
Nov
9
 

You may be familiar with tables in Excel but do you know how to use all the features? In this webinar we go in depth and explore some of the more subtle aspects of tables. We cover topics relating to formatting, how Excel works, and some questions from the audience.

 

You can download handout here

You can give us feedback and give us your thoughts here

Nov
1
 
Something new we are trying, here on the LSNTAP blog we will be posting job opening and RFPs from the community and posting them here. We are starting with doing a post on the first and third Tuesdays of each month and adjust from there. If you have questions, feedback, or something you would like to put up in the next post like this email me at ketn@nwjustice.org
 
For this inaugural post we have three job openings.
 
The first opening is for the position of Executive Director at LAF in Chicago. This is your chance to bring your experience and skills to this great organization, the only drawback is whoever takes this position is probably going to owe Cleveland Legal Aid some pizzas. Full information on this Executive Director position and how to apply can be found here.
 
The second opening is for a IT Project Manager over at Equal Justice Wyoming in Cheyenne. They are looking for someone to develop a variety of technology projects to support self represented litigants, legal aid advocates, and pro bono attorneys. Full information on this IT Project Manager position and how to apply can be found here.
 
The final opening is for a Pro Bono Director at Virginia Legal Aid Society in Lynchburg. This position involves a bunch of duties are increasing the number and effectiveness of attorneys and law students providing pro bono help. Particularly interesting is the goal of helping create and promote the use of a statewide pro bono portal. Full information on this Pro Bono Director position and how to apply can be found here.

Pages