Filter your results
Results 151 - 160 of 385. To narrow results enter search keywords or select filters.
On December 7, 2021, we had a panel share what legal aid programs should do if they experience a cyber attack.
Despite your best efforts, your program suffered a cyber attack. What should you do now? Join us to learn about types of attacks, how to respond after an attack, who should be notified of the attack, and how to mitigate damage after an attack. This webinar will also explore how to work with your insurance company after an attack.
Panelists:
Addition Information
There is a lot of other great writing other there about the topic of social media, here are a few of the links we found more useful and interesting.
A Few Good Tools for Measuring and Monitoring Social Media http://www.idealware.org/print/2592
The Legal Aid Society of Cleveland created this toolkit to support programs that want to use text messaging to gather outcome data following limited scope legal services. Legal service providers, statewide websites and court self-help centers offer self-represented litigants (SRL) help in a variety of ways with a wide range of problems. These limited services include advice at clinics, help filling out forms, and recommendations about enforcing rights and responsibilities.
The legal services community has not been immune to cybersecurity incidents over the past years. Indeed, a significant number of programs have been compromised and significantly impacted by cyber attacks each year. As with the broader non-profit, business, and government communities, the incident rates and stakes are growing within our community.
Purpose
The Problem
Self-Assessment for Organizations
Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.
What Everyone Needs to Know
What Everyone Needs to Know
Multi-Factor Authentication (MFA) adds a second layer of security when logging into your account making it more difficult for cybercriminals to access your account. This means when logging in, you typically need to authenticate in two ways (e.g., password you know and a device or a code you have).
What Everyone Needs to Know
Pagination
Close
Filter your results
Type
Topics
Tags