Filter your results
Results 1 - 10 of 10. To narrow results enter search keywords or select filters.
Email communication was never conceived to be the center of our digital lives, hence it wasn't created with security in mind. Today it is an essential part of business communication. Everyday sensitive and confidential information traverses the Internet and other unsecured networks where it may be intercepted or read. Microsoft Office 365 service has been improved by providing multiple methods to encrypt your email, including OME (Office Message Encryption), S/MIME (Secure Multipurpose Internet Mail), IRM (Information Rights Management) and TLS (Transport Layer Security).
This intro level security class is focused specifically on remote working and protecting your client’s confidentiality and your organization's security. Since we have all moved online, hackers and scammers are targeting this new set of remote workers.
In this webinar you'll learn about:
Phishing
Michael Hernandez / Director of Client Services at Just-Tech, LLC
Juan J. Ocasio / Director, Office of Information Systems Puerto Rico Legal Services, Inc
Liz Keith / Program Director at ProBono Net
Joseph Melo / Director of Engineering Just-Tech, LLC
Puerto Rico Legal Services, Inc.
Recently a friend got hit with some ransomware. He is tech savvy and still fell victim to it, after helping him deal with it I thought I’d share some some of the things I learn with you.
The legal services community has not been immune to cybersecurity incidents over the past years. Indeed, a significant number of programs have been compromised and significantly impacted by cyber attacks each year. As with the broader non-profit, business, and government communities, the incident rates and stakes are growing within our community.
LSNTAP hosted a webinar series called Season of Security: Enhancing Security in the Legal Aid Community. The series focused on different aspects of security and how programs can take steps to improve their security practices. Each webinar was aimed at a specific audience.
Today we held a webinar covering what all goes into creating and using a tech disaster plan. We started by thinking about four scenarios that exemplify the major kinds of disasters, loss of data, loss of power, loss of senior or key staff, and a breach. From there we look at some things that you will need to think about when coming up with a plan for each of these situations. Some of the more interesting things we covered included things like what is an acceptable level of downtime and how much risk are you willing to take on.
Close
Filter your results
Type
Topics