• Blog
  • About
Technology Tips For Lawyers

Biggest Security Threats To Mobile Data

3/31/2013

1 Comment

 

Biggest Security Threats To Mobile Data


Picture
As mobile use among lawyers increases, so does the amount of confidential data that is sent through mobile devices and stored in the cloud where it can be accessed by mobile devices.  As technology advances in the mobile field, so does technology advance for hackers and thieves that wish to gain information and use it for personal or monetary gain. Here are some of the biggest threats to mobile security and how to deal with the challenges.


Top 4 threats to mobile data

  • Lost or stolen mobile device: One of the most common breaches is often due to user error. A lost mobile phone, tablet or laptop can contain valuable information that thieves or hackers can use to their advantage. Often, the attack is more targeted. A thief will wait for the right moment to steal the phone, tablet or laptop to gain the information which can be used for monetary gain or other reasons.

If your mobile device or laptop is lost or stolen, there are several actions you need to take immediately. You should have a good plan in place just in case such an incident was to occur.

The first step is to report any loss immediately. If there is financial data stored in the phone, the financial institutions should be notified and put on alert in case of any suspicious activity.

Next, all authentication methods must be changed. Not just passwords, but security challenge questions and other information that can be used to access the accounts. Be sure to change your security questions to something that is not personal and is not even remotely related to the business of the account. Otherwise, the answer may be able to be guessed by a motivated hacker.

Extra authentication should be added where available. Two-step (also known as two-factor) authentication should be added whenever possible. This makes it harder for thieves or hackers to access your account.

  • Manipulation: The loss of data is just the beginning. Once sensitive information has fallen into the wrong hands, the real crime begins. Depending on what type of information has been stolen, it may be used in a variety of ways- ransom notes, extortion, blackmail, etc. This can lead to a host of actions against an attorney that doesn't take the proper measures to protect confidential client data. All possible precautions must be taken to ensure that this does not happen. If it does, the culprits must be caught. There are apps that can track stolen mobile devices and laptops. And of course, complete cooperation with authorities that are investigating the matter will help expedite the process.

  • Unauthorized access: Not all information is used for extortion or blackmail. Sometimes the competition will steal company secrets, confidential information, client lists, formulas, recipes or other information that they can use against the competition. This information can be accessed by stealing a mobile device or laptop, gaining access through a Wi-Fi connection or by using malware on a company computer or laptop to steal data.

  • Lack of security: Lack of security provides easy accesses to knowledgeable hackers. Easily guessed passwords or security challenge questions can lead to unauthorized access. Using mobile devices in unsecured wireless hotspots such as restaurants or coffee shops can lead to breaches in security. Downloaded apps can contain malware or keylogging features that can steal information and pass it on to criminals.

Strong passwords, extra authentication measures, keeping passwords safe, making smart decisions and being aware of your surroundings when accessing confidential accounts- these can all help keep data safe and secure. Recovering data once a breach has happened is duly important as well. 

Using cloudHQ for a secure backup of all data

A secure backup plan is essential to maintaining a copy of all data in case a breach happens and data is stolen or deleted. While the hacker may have a copy of the data, at least he can't completely delete it so that you will not have access to it. The best cloud storage backup service currently on the market is cloudHQ. The cloudHQ service provides a secure backup of all data to another cloud service account so that if the main account is hacked and data deleted, a secondary copy of the data will remain in the backup account. The replication is automatic and continuous so any changes made to files or documents are updated to the backup account instantaneously. CloudHQ can also convert data to common formats such as Microsoft Word format or PDF. This is extremely helpful when providing a backup of all Evernote notes as the backup account can store the documents in PDF or Word files.


Related articles
  • Revisiting cloud computing: how has it changed - and changed us? (gizmag.com)
  • Information Commissioner publishes guidance on Bring Your Own Device (techblog.brodies.com)
  • Apple introducing extra protection against hackers (guardian.co.uk)
  • How You Are Helping Hackers Steal Your Data (hongkiat.com)
  • Five security risks of moving data in BYOD era (zdnet.com)
  • Subscribe to Pogoplug Family for $19.95, get a free Pogoplug (reviews.cnet.com)
  • Mobile device data recoveries surge (net-security.org)
  • Password denied: when will Apple get serious about security? (theverge.com)
  • BYOD: Major Risk or Latest Bandwagon? (blogs.oucs.ox.ac.uk)
  • Nearly One in Three Consumers Who Have Lost Their Mobile Devices Still Do Not Lock Them, New Survey Shows (darkreading.com)

1 Comment

Rocket Lawyer On Call App Provides Mobile Legal Services

3/31/2013

2 Comments

 

Rocket Lawyer On Call App Provides Mobile Legal Services


Picture
Rocket Lawyer has introduced a new mobile app called 'Rocket Lawyer on Call' that allows users a variety of options for contacting lawyers. Basically, it lets users ask questions and receive answers from lawyers that are currently on call. It also allows users to initiate a chat session with local lawyers by using the mobile devices GPS feature to reach local lawyers in the area the user is currently in. The app can also provide a non-disclosure agreement (NDA) that can be legally e-signed in order to create a legally binding document.


Rocket Lawyer’s legal services

Legal questions, even complex legal questions receive an answer from one of the lawyers within one business day. Questions about contracts or other legal documents can be answered quickly by qualified legal experts, directly from a smartphone or tablet. If further consultation is required, the app can be used to find to find a lawyer in the local area that can help with the issue by telephone or other communication methods. Rocket Lawyer members that use the "talk to a lawyer" feature will receive discounted rates and free consultations.

If an NDA is needed, it can be created directly from the app wherever the user is at. The NDA can be signed on the spot or emailed to the person that needs to sign it. The signed NDA documents do constitute a legally binding document which offers legal protection within a matter of minutes.

The Rocket Lawyer on Call app offers an array of services that can help in situations when sound legal advice is needed fast and a phone call or email will not suffice.


Related articles
  • Non-Disclosure Agreement Template (NDA) (rightsignature.com)
  • Lawyer's strike warning on legal aid (bbc.co.uk)
  • 6 Reasons the Legal Industry is Ripe for Startup Invasion (tech.co)
  • Nelson helps in legal aid shortage (stuff.co.nz)
  • Different Types Of Legal Service Providers Your Can Hire For Your Business (myneworleansfamilylaw.wordpress.com)
  • Checklist On Selecting an Arizona Bankruptcy Lawyer (scotthyderlaw.com)
  • Product Release: Full NDA Attachment Support & Easier Opportunity Creation (axialmarket.com)
  • Work Out Your Legal Responsibilities with Legal Services (samefron33.wordpress.com)
  • ChrissyKwon858 (wikicancel.org)
  • Technology in libraries improves access to the legal system (bangordailynews.com)

2 Comments

Google Scholar's Amazing Legal Research Capabilities

3/31/2013

0 Comments

 

Google Scholar's Amazing Legal Research Capabilities


Picture
Legal research formerly consisted of the lengthy, complex process of browsing through old, hardcover law books. While computerized research methods have certainly speeded up the process, most of the methods are not free and are not accessible by everyone. Google Scholar changed all that in 2004 and for the last nine years, it has provided a database of freely accessible materials for lawyers and aspiring lawyers everywhere.

Documents range from Federal court documents to state documents and decisions. A simple search of the term DUI turns up thousands of DUI cases which can then be reviewed and analyzed for research. The same goes for other search terms such as assault, homicide, or drugs. These documents can be filtered and organized by date or relevance. Alerts may be created so that users are notified when documents containing specific search terms are added to the database.

Google Scholar covers a range of literature for scholars including articles, books and theses. There are several smartphone apps for both iOS and Android that allow users from mobile devices to quickly search and browse results from Google Scholar. As tablet use in the courtroom is becoming more accepted, this can help when results are needed quickly from a mobile device.


Google Scholar embeds links in court documents

Another advantage of using Google Scholar is that hyperlinks are embedded to the documents. Unlike in the official court PDF, links to other cases that are mentioned in the document have quick links that allow users to quickly browse related documents and decisions.

The Google Scholar database is extensive and search results are returned in typical Google fashion, with the most relevant at the top. For lawyers, lawyer's aides or other legal researchers, this free, yet valuable, service form Google should not be overlooked. For lawyers on the go, its mobile capabilities are practically unbeatable.


Related articles
  • With Google Reader gone, is Google Scholar next? (digitopoly.org)
  • GoogleScholar 0.1 (pypi.python.org)
  • Legal Research With Google Scholar - Finding Significance In The Cloud (futurelawyer.typepad.com)
  • SEO for scholarship — Manipulating Google Scholar Citations and Scholar Metrics (roughtype.com)
  • Finding Significant Opinions Citing Your Case With Google Scholar (futurelawyer.typepad.com)
  • How to Prepare for AuthorRank and Get the Jump on Google (seomoz.org)
  • Summary of the #FutureSearch Talk with Google, Bing & Blekko (seomoz.org)
  • More on Google Scholar legal research tips (lawprofessors.typepad.com)
  • Why You Should be Using Google Scholar (postgrad.com)
  • Teacher's Guide on The Effective Use of Google Scholar (educatorstechnology.com)

0 Comments

Tablets In The Courtroom

3/26/2013

0 Comments

 

Tablets In The Courtroom


Picture
Mobile technology is expanding at an ever-growing pace and it has found its way into the courtroom. Today's lawyer is embracing the mobile movement that consists of a paperless office. Tablets and smartphones have become the new tools of the trade. Tablets can be used to handle all aspects of the trial.

While there are a large variety of tablets available, the iPad is currently the most popular. It has been used in courtrooms and this use has been previously documented on blogs. With several apps, the iPad (or other tablet of your choice) can encompass everything you need in court.


Top apps for the iPad and other tablets in the courtroom

There are many useful apps for lawyers that can make your courtroom experience go more smoothly and efficiently.

Evernote is an extremely useful app that can handle nearly all the document needs of the courtroom. Dropbox is perfect for storing evidence such as large video or audio files. Basecamp is all-in-one project management tool that is perfect for managing case files. There are other apps that allow tablets to be connected to a projector for displays and presentations. By utilizing the sync with the cloud, lawyers can stay on top of any new developments that may happen, even while they are in the courtroom.

As the world goes mobile, tablet use is becoming more widespread throughout courtrooms all over the nation. The iPad may be the most popular, but Android tablets are fast becoming more popular as well. 


Related articles
  • Tablets buying guide (reviews.cnet.com)
  • Android tablets projected to outsell iPad for first time in 2013 (bgr.com)
  • Apple's iPad Grabs 98% Of Tablet Web Traffic (misco.co.uk)
  • 7-inch Android tablets to overtake iPad in Q1 2013, analyst says (androidauthority.com)
  • Apple's iPads to fall behind Android tablets this year (firstpost.com)
  • Sales of Apple iPads to be overtaken by Android tablets (telegraph.co.uk)
  • More People Will Own Android Tablets Than iPads By Later This Year (macgasm.net)
  • iPad's Mini's price makes it just a small threat to Android tablets (reviews.cnet.com)
  • How To Shop for a Connected Gift: Tablets (bestbuymobile.com)
  • Airline Tablets and iPad Restrictions May be lifted (dearjanedoe.com)

0 Comments

Social engineering for lawyers

3/26/2013

0 Comments

 

Social engineering for lawyers


Picture
Social engineering is nothing new, it has been used for centuries to gain unauthorized access to restricted areas or content. Basically, social engineers use the human nature natural tendency to trust other people i n order to manipulate them into giving out sensitive data or other restricted content. They can use this information to access accounts, steal or delete information and install viruses or malware. Approximately 1 out of every 3 computers are infected with malware. 


Social networking social engineering methods

Social networks are comprised of millions of users and this is the perfect breeding ground for scammers. By using malware to infect computers, scammers are able to pose as a user's friend and send them messages, posts or comments. Some of these scams use phrases similar to these.

  • "Did you see this video of you? Click here to see it."

  • "Why did you send this to me?"

  • "Wow, is this really you in this photo?"

Each of these phrases will have a link and if the recipient clicks on this link, his computer can become infected with malware as well. Then it will be used to send links to other users and the process continues.

Tech support social engineering methods

One of the most popular scams plays on the normal computer and internet user's lack of technical knowledge. The tech will tell the user that they are infected with a virus or worm and attempt to lead them through a difficult removal. At some point, the tech will say something like, "why don't I just fix this for you? Let me have your password, I will fix it and get back to you when I'm done." The grateful user will eagerly give out the sensitive information just to avoid the headache of dealing with the problem.


Phishing social engineering methods

Phishing is an extremely large and complex subject but the basics of it are that a person may pretend to be someone they are not in order to gain unauthorized information. A web site will pretend to be a web site that is well-known and trusted to the user in order to gain sensitive information. EBay and PayPal scams are huge because the sites are generally trusted by the users and they quickly click on links in order to prevent any interruption in their use of the services.

Other sites spoof social networking sites such as Facebook and Twitter in order to trick users to inputting their login information which is recorded and stolen.

In the law firm, there is a huge amount of sensitive information. Beware of any messages, posts, comments, emails or web sites that seem even the least bit suspicious.


Related articles
  • What is Social Engineering? (webroot.com)
  • Hacking the Mind [Infographic] (thetechscoop.net)
  • A look at social engineering (glennswritinginterest.wordpress.com)
  • The concise 2013 list of social engineering scams (concise-courses.com)
  • Cybergangs embracing crimeware over social engineering (net-security.org)
  • What is Phishing? (webroot.com)
  • Hacking the Mind: How & Why Social Engineering Works (veracode.com)
  • The Secret To Chinese Hackers Success (social-engineer.org)
  • Labor Day Phishing Scams - Don't Get Hooked This Year | Webroot Software (webroot.com)
  • LinkedIn Endorsements are Social Engineering (securosis.com)

0 Comments

Recent Evernote Hack Raises Questions About Cloud Security In The Law Firm

3/26/2013

0 Comments

 

Recent Evernote Hack Raises Questions About Cloud Security In The Law Firm


Picture
Cloud security is a concern for many companies and especially companies that deal with extremely sensitive data such as law firms. When Evernote was recently hacked, over 50 million users had to change their passwords. There have been other large corporations that were recently hacked as well, including  Dropbox, Apple, Microsoft and Facebook. Incidents such as these prove the need for lawyers that store data in the cloud to keep the strictest security measures, especially authentication measures, in place.


Stronger passwords equal stronger cloud security for lawyers

A glimpse at how weak many users make their passwords can be found at the top 25 worst passwords of 2012, and it may come as a shock  to you that "password" is still the most commonly used password. Passwords that appear on this list should not be used, nor any passwords from larger common password lists, such as the 10,000 most common passwords list. In a site-performed study, it was discovered that over 90% of all people use a password that can be found among  the top 1000 most commonly used passwords. Since there are computers that boast the ability to be able to process 348 billion passwords per second, any passwords found in the top 1000 will not take very long to crack. Another resource for poor passwords is the list of passwords that Twitter found to be too common and banned them from being used in the service. If you are concerned about the strength of your password, you can go to http://howsecureismypassword.net/ to discover just how strong your password is and it will also tell you about how long a typical desktop computer will take to crack the password.

How to create a secure password

Check out this analysis by Troy Hunt on the science of password selection for an in-depth look at how the normal computer user creates their passwords. Longer passwords take longer to crack as the computer the hacker is using to crack the password must process many more passwords to reach the actual password than a shorter password takes. Sometimes it’s even  much better to have a long password that you can remember than to rely on a short password that could possibly be hacked much quicker.

SplashData offers these tips for users that wish to create a secure password:

  • Use passwords of eight characters or more with mixed types of characters. One way to create longer, more secure passwords that are easy to remember is to use short words with spaces or other characters separating them. For example, “eat cake at 8!” or “car_park_city?”

  • Avoid using the same username/password combination for multiple websites. Especially risky is using the same password for entertainment sites that you do for online email, social networking, and financial services. Use different passwords for each new website or service you sign up for.

  • Having trouble remembering all those different passwords? Try using a password manager application such as 1Password that organizes and protects passwords and can automatically log you into websites. The downside is that using a password manager isn't always possible and it isn't always practical either.

Enable 2-factor authentication if your cloud provider offers it

Many cloud providers includingGoogle Drive and Dropbox offer 2-factor authentication to their users for increased security. Two-factor authentication consists of measures which require the presentation of at least two of the three authentication factors:

 a knowledge factor ("something the user knows"),

a possession factor ("something the user has"),

and an inherence factor ("something the user is").

This is how 2-factor authentication works:  The user enters their user name and password combination as they normally would. A code is sent from the service to the user’s phone or a preapproved app. This code can then be entered as the secondary authentication and access is granted.

How does this protect users?

If hackers were to gain access to a password (keylogger, sniffer, stolen laptop, etc.), they will still be unable to access the account because they will need access to the user’s mobile phone as well. The best way to prevent unauthorized access to your account is by the creation of strong passwords. The constant changing of passwords can prevent continued access if a breach occurs. Data remains secure because the 2-factor authentication makes it very hard for hackers to access an account.

Instructions on how to setup 2-factor authentication for Dropbox: https://www.dropbox.com/help/363/en

Instructions on how to setup 2-factor authentication for Google Drive and other Google services: http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744

A secure backup from cloudHQ offers complete data protection

The majority of security breaches happen because of poor password selection and other poor security measures. There is always the possibility that even with all these security measures in place, that a breach could happen. For example, if your laptop AND cell phone are stolen at the same time, the hacker may be able to access your account. If this happens, your data could be deleted by the hackers which can be detrimental when dealing with sensitive data in the law firm. The best way to protect your data if such a breach were to occur is through a cloud backup service such as cloudHQ.

The cloudHQ service offers a secure backup by creating and maintaining a secondary copy of all of your data. Replication is automatic and continuous so it operates completely invisible to the user and runs in the background, automatically updating in real-time as changes are made to the data.

As an example, let’s say you have anEvernote account and wish to use cloudHQ to provide a secure backup of your Evernote data. The first step is to create two Evernote accounts. One will be your primary Evernote account while the other will be your backup account. The cloudHQ service provides a continuous replication of all data from your primary Evernote account to your secondary Evernote account. If hackers were to gain access to your primary account, data deletion could occur (even data from the Evernote trash), but the backup account will still contain all your data intact.

As a lawyer in the cloud, keeping your data protected is first priority and this can be accomplished by creating a strong, secure password and implementing strong security measures. If the unthinkable happens, however, cloudHQ will be your law firm’s protector by ensuring that there is no data loss.


Related articles
  • Security experts laud Apple for following Microsoft, others on two-factor authentication (computerworld.com)
  • Apple adds two-factor authentication to Apple ID (zdnet.com)
  • Evernote planning two-factor authentication following hack (pocket-lint.com)
  • Apple adds two-factor authentication to iCloud and Apple ID (p30guide.wordpress.com)
  • Evernote plans two-factor authentication following last week's hack (engadget.com)
  • FBI Gets Bitten by Operational Security (veracode.com)
  • Apple Adds Two-Factor Authentication to Apple ID, Here's How to Set It Up (lifehacker.com)
  • Evernote Two-Factor Authentication Feature Launching Soon (geeky-gadgets.com)
  • Why Two Factor Authentication Should be a Part of Your Security Plans for 2013 (twilio.com)
  • Apple rolls out two-factor authentication, iForgot service is back up (siliconrepublic.com)

0 Comments

Basecamp For Lawyers

3/18/2013

0 Comments

 

Basecamp For Lawyers


Picture
Basecamp is the ultimate online project management tool for business professionals in practically every industry. But can it be used for case management in the law firm? The answer is, absolutely. While there are other applications and services that are specifically tailored to managing cases in the law firm, such as Clio and Rocket Matter, Basecamp offers a wide variety of tools that make case file management fast, efficient and simple.


How to use Basecamp for lawyers

Basecamp can be used in a variety of ways which makes it so unique. The software can be tailored to meet your specific needs. Basecamp went through a major transformation in 2012 bringing a new version of the service with many added features. For users that like the old Basecamp, they can still use Basecamp Classic.

Basecamp Calendar is one of the ultimate appointment management services around. You maintain complete control over which other users are able to view or access your calendar. An event that is added can be collaborated on and discussions will be saved to the event. Files, documents and presentations can also be saved to the event. Basecamp will send you (and any other users you choose to list) email reminders for each event. The interface is simple and scrolling through events over multiple years can be done in seconds, no need to browse month-to-month to find prior or future events.

Basecamp is efficient and organized. The service uses single-page projects to keep all aspects of the project organized in one area for simple use. No need to search through databases of files, Basecamp keeps everything in one centralized area where it can be accessed from a single page. The single-page project management is very efficient for managing case files. Each project can be given a name and a description. Below this is a discussions area for collaboration with coworkers, legal aides, sources and clients. All comments and discussions are saved to the project.

Below the discussions area is the To-Do lists. Anything that needs to be done is in this area with a checkbox beside it. Once an assignment has been completed, the box can be checked and the entry will be greyed out but still visible. Below this area is the file storage area. Each file is shown with the option to download or to view the file with discussions so it can be collaborated on with others. Text documents are stored below the file area and can be viewed. Drafts, notes, ideas, concepts- anything that is entered in text related to the project is saved here.

Basecamp mobile allows users to take Basecamp with them anywhere they go. The downside is that the developers only created an app for the iPhone, users with other platforms must login through the web browser, although there are several third-party apps that bring Basecamp directly to these platforms. 

Protecting your Basecamp data with secure backup

While Basecamp has very strict authentication and security measures in place, things can still happen. If you use Basecamp in your law practice, you will be happy to know that Basecamp is compatible with cloudHQ so you can always have a secure backup of your files in case you accidentally delete a file or a hacker gains access to your account and deletes your data. Basecamp is one of the premier project management cloud services available and the combination of Basecamp and cloudHQ ensures that your data is protected from data loss at all times.


Related articles
  • 37signals launches Basecamp Personal (37signals.com)
  • After 8 Years On The Web, Project Management Platform Basecamp Finally Launches An "Official" iOS App (techcrunch.com)
  • The official Basecamp iPhone app from 37signals (37signals.com)
  • Time Tracking in the New Basecamp (paydirtapp.com)
  • How to Use Basecamp (yourexcellentva.wordpress.com)
  • Definition and Recognition: How To Set and Meet Goals Effectively (workzone.com)
  • Basecamp Launches Its First Mobile App to Help You Manage Projects (smallbiztrends.com)
  • Basecamp on the iTunes App Store (itunes.apple.com)
  • Basecamp 2013 Review: Project Management Tools for Small Businesses (inspiredm.com)
  • The Changing Landscape of Digital Marketing (workzone.com)

0 Comments

Cloud Computing For Lawyers Becoming More Popular

3/18/2013

1 Comment

 

Cloud Computing For Lawyers Becoming More Popular


Picture
More law firms than ever are moving their data and services to the cloud. While many lawyers are skeptical of the benefits of using the cloud, many are taking their practice to the next level. The fact that it is becoming much more popular is evident as more attorneys are speaking out about the benefits of moving to the cloud.

Attorney Christopher Hill posted on his blog that “Cloud computing means that staff can access the files and data that they need even when they’re working remotely and/or outside office hours. As long as an attorney, paralegal or even a client can get on the Internet, work product can be accessed from home, on the road, from clients’ offices or even from a smart phone such as a BlackBerry or iPhone. Staff can also work collaboratively on files and documents, even when they’re not physically together. Documents can simultaneously be viewed and edited from multiple locations.”


The benefits of cloud computing for lawyers

There are many benefits to moving your practice to the cloud. One large benefit is that the cloud is more cost-efficient. Saving money is great, but moving to the cloud eliminates local costs such as IT; buying, upgrading and maintaining on-premise hardware storage solutions; the cost of a larger office because of needed storage space; and much more. Moving to the cloud reduces IT costs by 30-50%.

One of the most important benefits is security and backup. Many lawyers have concerns over moving their data to the cloud because of security concerns. Most cloud services have very strict security protocols and authentication measures in place. A strong password, two-step authentication and monitoring who has access to your data are some of the best ways to prevent unauthorized access to your data. A secure backup of all data through a prominent cloud storage solution like cloudHQ is highly recommended in order to prevent data loss.

There are many other benefits to moving to the cloud such as collaboration, customization, convenience and more. The cloud is the future and this is evidenced as more law firms make the move to the cloud.


Related articles
  • To build trust in cloud engagements, ask these 3 questions (zdnet.com)
  • Telecommuting and Cloud Computing (sys-con.com)
  • Cloud's agility compelling for law firms (intechnology.co.uk)
  • How the cloud and mobility will continue to grow together (lenovo.com)
  • Notice of Appointment of a New Representative Director (sys-con.com)
  • Cloud Expo NY: Big Data into a Small Storage Package with Cloud Storage (sys-con.com)
  • 6 Cloud Computing Blogs You Should Be Reading (backupify.com)
  • Despite risk, more SMBs consider cloud backup (zdnet.com)
  • Buckeye Telesystem goes cloud-based (toledoblade.com)
  • 2 Cloud Computing Concerns And How To Deal With Them (blogs.sap.com)

1 Comment

Where To Turn As Google Reader Bows Out

3/18/2013

0 Comments

 

Where To Turn As Google Reader Bows Out


Picture
Google is closing down its popular RSS reader, Google Reader, in July 2013. It's still a few months away but now is the time to start looking for a replacement so it doesn't sneak up on you later. For most of us this news came as a surprise as Google Reader incorporates all of the necessary features a good RSS reader should have. The sharing capabilities for Gmail and G+ are great as well. There are many other alternatives, but they all seem to come up short on features when compared to Google reader.


How to download and transfer your Google Reader data

One step you need to remember is to download all your data and transfer it to another service or store it for later use. If you follow other lawyers' feeds, legal and news sources such as the ABA Journal's feeds, or other feeds that help you in your law practice, you should download the data so you can maintain your database. After July, you may not be able to retrieve any more of your data from Google.

The best Google Reader alternatives

Some of the best current alternatives appear to be Fever, Feedly, The Old Reader, Netvibes, Pulse, Tiny Tiny RSS and NewsBlur. They all have decent features although you should check through the features and options to determine which reader is most suitable for your RSS feed needs. Also, keep an eye on the news; I fully expect companies to develop Google Reader clones in the upcoming months and this could make for interesting competition as well.


Related articles
  • How to Transition From Google Reader to Feedly [Plus Other RSS Reader Alternatives] (bizsugar.com)
  • The Google Reader addict's guide to feedly (pocketables.com)
  • Feedly's User Base Surges Following Google Reader Shutdown (on.aol.com)
  • RSS app Feedly adds over 500K new users after Google Reader drama (venturebeat.com)
  • How Feedly fills Google Reader gap (billbennett.co.nz)
  • 8 Google Reader alternatives for your PC (reviews.cnet.com)
  • R.I.P. Google Reader: 2005-2013 (uproxx.com)
  • Dump Google Reader for Feedly, All the Cool Kids Are Doing It (geekosystem.com)
  • 3 Easy Steps to Export Feeds from Google Reader (kvliveblog.wordpress.com)
  • So Long Google Reader... Hello Feedly! (musingsofamildmanneredman.com)

0 Comments

Backup Your Cloud to Dropbox

3/12/2013

2 Comments

 

Backup to Dropbox

Dropbox is a leading cloud storage system. Many consider it as the perfect backup solution for your important files.

However, how can you backup, data from other cloud services such as Evernote notes, Google Docs documents, and Box files to Dropbox?

Here is how:

2 Comments
<<Previous
    Subscribe to our mailing list: 


    Sync and integrate your Evernote, Dropbox, Google Drive, SkyDrive and Box accounts

    Technology Tips  For Lawyers

    Helping lawyers solve the technology puzzle.

    Archives

    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    November 2012
    October 2012
    September 2012
    August 2012

    Categories

    All
    Amazon S3
    Amicus
    Android
    Backup
    Basecamp
    Box
    Byod
    Clio
    Cloudhq
    Cloud Integration
    Cloud Security
    Cloud Security
    Cloud Storage
    Collaboration
    Data Loss Protection
    Data Loss Protection
    Dragon
    Dropbox
    Encryption
    Evernote
    Facebook
    Firefox
    Gmail
    Google
    Google Apps
    Google Chrome
    Google Docs
    Google Drive
    Google Plus
    Google Reader
    Google Scholar
    Information Security
    Information Security
    Ipad
    Linkedin
    Mobile
    Mobile Apps
    Mobile Security
    Mobile Security
    Paperless
    Rocket Lawyer
    Rocket Matter
    Rss Reader
    Search Engine Optimization
    Skydrive
    Social Engineering
    Social Media
    Software As A Service
    Sugarsync
    Tablet
    Twitter
    Virtual Office
    Windows 8

    RSS Feed


cloudHQ