User login

Blog Posts

Displaying 21 - 25 of 362
Enter keywords to search the current selection of blogs
A little behind schedule but here is another posting of opportunities within the community.
Content manager for Pro Bono Net and LawHelpNY
Pro bono Net is looking for a content manager to plan strategy and create content for websites and social media. They are looking for someone with a couple of years of experience doing content development and is fluent in Spanish, if this sounds like you take a look at the full posting and shoot them a resume.
RFP for data scientist for Illinois Legal Aid
Illinois Legal aid is looking for a data scientist consultant to mine data collected through the website for insights and create a predictive model. This is the first step of creating a personalized engine for the website that will offer a more personalized experience to users of the system.
The application deadline is january 9, 2017
Final selection January 27, 2017
Final deliverables no later than May 5, 2017
Summer internship for ATJ Tech Fellows
Some folks at Seattle University Law have launched a new paid summer internship for law students to work on real projects involving tech. Students will spend 10 weeks working at one of 11 host organizations around the country.
More information can be found on our previous blog post and the Tech Fellows website, or you can jump directly to the online or printable applications.
LAF in Chicago is looking for a new Executive Director, if you are interested you can apply here.
Koya is handling this process so be sure to go through them and don’t directly contact LAF.

We're conducting a survey for next years webinars and guides and your input would be appreciated. Click the button below to start the survey:

Just today some fine folks of at Seattle University have launched the ATJ Tech Fellows program.
Some fine folks
Tech Fellows is a program that provides Law students with a ten month paid summer internship where they will be placed at a partner legal services organization. At the start of those ten weeks participants will go through a series of webinars designed to bring them up to speed on the current state of tech in legal aid, the will then be assigned to a mentor at the host organization and work on a variety of projects that sit on the intersection of tech and legal aid.
This is a great chance for a student who is interested in tech to spend a summer cultivating their skills while working on projects for their host. What exactly they will be working on will vary, it could be anything from automating forms to managing statewide websites.
Applications are now open for the summer of 2017, applications close February 15, 8pm est.
The locations you can apply to work:

You can apply online or download and print the application, for more information check them out on their application page.
Recently a friend got hit with some ransomware. He is tech savvy and still fell victim to it, after helping him deal with it I thought I’d share some some of the things I learn with you.
To start off let’s look at what ransomware is. Ransomware is a very simple attack, once the attacker gets access to your computer they encrypt all of your files. Once that is done they offer to give you the key to all your files in exchange for a payment within a certain amount of time. If you choose not to pay within the time then generally the price goes up, and if you never pay you never get the key from them. Ransomware is a threat to you both on a personal and organizational level, on the personal level they typically demand 300-600 dollars while at the organizational level it can be tens or hundreds of thousands of dollars, they
There are fortunately many ways to reduce your chances of falling victim and to mitigate the damage should the worst happen. There are two broad stratagies to dealing with ransomware, damage prevention to prevent it from ever taking hold and damage control to mitigate damage once you have been attacked. Ideally you would never need the latter but mistakes will happen eventually and it's important to know what steps to take.
Damage Prevention
Keep Up to Date
Keep all of your software up to date. One of the common ways they get into your computer is through an out of date plugin. It doesn’t matter that the exploit has been found and fixed if you haven’t downloaded the patch.
Lock Things Down
Limit permissions on your computer. There are lots of little things that you can close down that will limit their ability to get at your computer. If you aren’t using things like Remote Desktop Protocol disable that, and if you can operate without it disable files from running from the AppData and LocalAppData folders.
Show Extensions
Show hidden extensions. Sometimes malicious files arrive with the extension “.pdf.exe”. Since windows hides extensions by default that file will show as file.pdf which looks innocuous if you aren’t paying close attention. Setting windows to show extensions will make this sort of scheme much easier to spot.
Educate your Staff
Ultimately the main cause for failure is user making a mistake, anything from opening the wrong attachment to using a thumb drive with an infected machine and then bringing it to work. Strong education and good awareness of what to look out for go a long way to keeping things secure.
Damage Control

First of all you should be creating and maintaining backups anyways as part of your routine. Even without malicious intent hard drives fail and accidents happen. Being
able to simply restore from from a backup turns an attack from a huge problem to an inconvenience that takes a little time. Remember when making backups you need to make at least to backups in addition to the original and keep one of those off site. Having a portable hard drive with your backups next to your computer do little good if you lose your office in a fire or a thief steals both. It is important is to store the backup disconnected from your computer, if you leave it plugged in then ransomware will simply encrypt it too.
Also important is to test your backups regularly. Like any other physical medium they degrade over time, if you don’t verify them you could be in rude shock when you least expect it.
Immediate Damage Control
If you realize you just opened a suspect email attachment or ran a file you think contains ransomware you can limit damage if you act quickly. First of all disconnect from the internet and any networks you are on and remove and external devices like phones or external hard drives, also turn off Wi-Fi and Bluetooth. The ransomware will encrypt pretty much everything it can see so it’s important to limit its spread.
More Backups
After getting everything encrypted make a backup of all the encrypted files somewhere. If all else fails a way to decrypt the files may discovered at some point in the future, and in one case one of the attackers had a pang of conscience and put out a code so everyone they hit could decrypt their files.
Check for Solutions
A few versions ransomware have had some weaknesses in their encryption that have allowed third parties to crack them, check out these resources to see if is an option for you.
Wrapping Up
In the end while getting hit with ransomware can be devastating there are a few easy steps that can drastically reduce the risk of getting hit and the severity of the damage if that slim chance happens. If you want to learn more check out this guide created by KnowBe4. It is well written and covers the topic in more depth.
As it happens my friend was was lucky, he had been hit with Coinvault and the decrypter linked to above managed to fully decrypt all of is files. You can bet that he has taken some of these steps I listed above and should it happen again he will be prepared.

You may be familiar with tables in Excel but do you know how to use all the features? In this webinar we go in depth and explore some of the more subtle aspects of tables. We cover topics relating to formatting, how Excel works, and some questions from the audience.


You can download handout here

You can give us feedback and give us your thoughts here