SlideShare a Scribd company logo
1 of 1
Download to read offline
OREGON LAW PRACTICE MANAGEMENT

15 Steps You Can Take Now to Protect Sensitive Data
The October issue of the Oregon State Bar Bulletin contains a must-read article entitled The Data
Dilemma: Law Firms Strive to Strengthen E-Security as Potential Threats Continue to Rise.

To understand why you should be concerned, read the article. To take steps now to protect your firm,
read John Simek and Sharon Nelson’s sidebar, “E-Security Pros Offer 15 Tips to Help Law Firms Better
Protect Sensitive Data” posted as a PDF on the OSB Web site. Among John and Sharon’s
recommendations:

      Use unique passphrases for each Web site/account/software program (Passphrases are better than
       passwords)
      Properly encrypt laptops, flash drives, and backup media
      Physically lock up your server
      Properly vet all cloud service providers
      Secure Wi-Fi networks
      Wipe data with Darik’s Boot and Nuke if you donate/dispose of your computer, digital copier, or similar
       equipment
      Consider cyber insurance (Your Professional Liability Fund coverage does not protect against data loss).

Read all 15 tips here.

Originally published October 8, 2012 at http://oregonlawpracticemanagement.com/2012/10/08/15-steps-you-
can-take-now-to-protect-sensitive-data/.

More Related Content

Viewers also liked

Presentatietekstschrijversnl 124747672809 Phpapp01
Presentatietekstschrijversnl 124747672809 Phpapp01Presentatietekstschrijversnl 124747672809 Phpapp01
Presentatietekstschrijversnl 124747672809 Phpapp01irenedeswart
 
Camino del Norte 2009 Thomas Labacher
Camino del Norte 2009 Thomas LabacherCamino del Norte 2009 Thomas Labacher
Camino del Norte 2009 Thomas Labachertlabacher
 
Engage121 - Brand Dashboards - june 2014
Engage121 - Brand Dashboards - june 2014Engage121 - Brand Dashboards - june 2014
Engage121 - Brand Dashboards - june 2014Engage121
 
Kujali blogging presentation
Kujali   blogging presentationKujali   blogging presentation
Kujali blogging presentationMonique Ross
 
PSB Phase 2 presentation
PSB Phase 2 presentationPSB Phase 2 presentation
PSB Phase 2 presentationcomment.ofcom
 
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...Koon Boon KEE
 

Viewers also liked (9)

Integrate Social Media & Search Marketing
Integrate Social Media & Search MarketingIntegrate Social Media & Search Marketing
Integrate Social Media & Search Marketing
 
PCM - Knowledge Management
PCM - Knowledge ManagementPCM - Knowledge Management
PCM - Knowledge Management
 
Evac timeline
Evac timelineEvac timeline
Evac timeline
 
Presentatietekstschrijversnl 124747672809 Phpapp01
Presentatietekstschrijversnl 124747672809 Phpapp01Presentatietekstschrijversnl 124747672809 Phpapp01
Presentatietekstschrijversnl 124747672809 Phpapp01
 
Camino del Norte 2009 Thomas Labacher
Camino del Norte 2009 Thomas LabacherCamino del Norte 2009 Thomas Labacher
Camino del Norte 2009 Thomas Labacher
 
Engage121 - Brand Dashboards - june 2014
Engage121 - Brand Dashboards - june 2014Engage121 - Brand Dashboards - june 2014
Engage121 - Brand Dashboards - june 2014
 
Kujali blogging presentation
Kujali   blogging presentationKujali   blogging presentation
Kujali blogging presentation
 
PSB Phase 2 presentation
PSB Phase 2 presentationPSB Phase 2 presentation
PSB Phase 2 presentation
 
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...
Value Investor Conference May 2010: Adapting the Investment Style of Buffett-...
 

More from Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 

More from Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 

15 Steps You Can Take Now to Protective Sensitive Data

  • 1. OREGON LAW PRACTICE MANAGEMENT 15 Steps You Can Take Now to Protect Sensitive Data The October issue of the Oregon State Bar Bulletin contains a must-read article entitled The Data Dilemma: Law Firms Strive to Strengthen E-Security as Potential Threats Continue to Rise. To understand why you should be concerned, read the article. To take steps now to protect your firm, read John Simek and Sharon Nelson’s sidebar, “E-Security Pros Offer 15 Tips to Help Law Firms Better Protect Sensitive Data” posted as a PDF on the OSB Web site. Among John and Sharon’s recommendations:  Use unique passphrases for each Web site/account/software program (Passphrases are better than passwords)  Properly encrypt laptops, flash drives, and backup media  Physically lock up your server  Properly vet all cloud service providers  Secure Wi-Fi networks  Wipe data with Darik’s Boot and Nuke if you donate/dispose of your computer, digital copier, or similar equipment  Consider cyber insurance (Your Professional Liability Fund coverage does not protect against data loss). Read all 15 tips here. Originally published October 8, 2012 at http://oregonlawpracticemanagement.com/2012/10/08/15-steps-you- can-take-now-to-protect-sensitive-data/.