-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
Endpoint Security: What is it and why is it important?
Your firm has dozens, if not hundreds, of endpoints. These are your remote computing devices that communicate with a network – servers, virtual environments, desktops, laptops, workstations, tablets, smartphones, and…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry since 2020.”…
-
Security Awareness Training: How To Build a United Cybersecurity Front
A security awareness training program helps protect your firm and its members by helping them avoid falling victim to current phishing campaigns, social engineering techniques and tactics, and other threats.
-
Top 5 Cybersecurity Trends in 2022
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than ever…
-
Advisory: Apache Log4j Vulnerability Log4j Zero-day Vulnerability AKA Log4Shell (CVE-2021-44228)
What is the Log4j Vulnerability? On December 9, a severe remote code vulnerability was revealed in Apache’s Log4j, a prevalent logging system used by developers of web and server applications…
-
Next Generation Firewalls – The New Standard For Network Security
Next generation firewalls are deep-packet inspection firewalls that function beyond the traditional port/protocol inspection and blocking. They add application-level inspection, intrusion prevention, and bring intelligence from outside the firewall.
-
Email Security Is A Priority For Law Firms
Email security software helps eliminate unwanted and unsafe emails before they reach the firm’s servers.
-
Your Security Posture: How to Ask, And Answer Questions About It
The question asked most infrequently regarding an organization’s cybersecurity is the most important—what are the underlying guiding principles that define your approach to security?
-
Beyond Antivirus – The Modern Solution is Active Endpoint Detection and Response (ActiveEDR)
Active Endpoint Detection and Response (ActiveEDR) blends advanced behavior analytics and machine learning to detect threats with automatic responses to remediate potential damage. This proactive tool protects your law firm…
-
Web / DNS Filtering – Keeping Law Firms Safe and Productive
We click on too many links and visit too many webpages every day to not have protection against malicious websites. That’s why we rely on Web / DNS Filtering as…
-
eBook: The Law Firm Guide To Strategic IT
This eBook discusses some of the barriers to “strategic” IT in small to medium-sized law firms, why it matters, and how changing the nature of IT can have a measurable…