Information Security For Lawyers
Be aware of the data you are responsible for

Account Verification Methods
- Passwords: Passwords are the most common form of account verification and protection. A weak password can be the cause of an unauthorized breach of access which can lead to data loss or theft. Even a strong password can be cracked, as the password cracking methods hackers use have become much more sophisticated. A strong password should use a mix of lowercase letters, uppercase letters, numbers and special characters.
- Design: Design verification is typically a method in which users create a design by connecting dots. Any time the correct design is drawn on the screen, access will be given to the account. A backup password is typically required (in case the user forgets their design), so that password should be an extremely strong password that cannot be guessed or easily cracked.
- Fingerprint Scanning: Fingerprint scanning is a fairly new technology that is currently in the stages of becoming popular. However, it can also be bypassed with a backup password, so be sure to create a secure backup password or the fingerprint scan becomes nothing but a novelty feature.
- Two-step Verification: This is an extremely useful feature that helps prevent unauthorized account access. If anyone attempts to login to one of your online accounts, a code will be sent to your mobile device. This code must be entered before account access will be granted. So if any malicious user get hold of your password, they must also have access to your mobile device in order to gain access to the account.
Mobile Security
Secure backup
If your law firm uses a cloud service to store data- let's say SkyDrive for this example, you can have all of the data replicated from SkyDrive to another cloud service, Box for example. So every time you add files to SkyDrive, they are instantly replicated to Box. And every time a file is revised, these revisions are instantly replicated to Box. And with two-way sync activated, the replication works both ways- SkyDrive to Box and Box to SkyDrive. And if any files get accidentally or maliciously deleted in one cloud service, you can simply login to the other cloud service and have instant access to your data. Restoration of files is simple and fast, and a costly data loss incident is avoided.
The cloudHQ system works with a variety of cloud services, and they are currently offering a free fully-functional 15-day trial for businesses and professionals to test cloudHQ and determine if it is right for their company.
Related Articles
- Top 3 Facts To Help You Develop A Successful Cloud Strategy
- 10 Tips To Prevent Data Theft
- How To Improve Collaboration By Integrating Google Apps With Evernote And Basecamp
- How to Create and Remember Strong Passwords to Keep Your Online Accounts Secure
- Demystifying Data Loss and Recovery
- The Most Unsafe Passwords of 2012 Look a Lot Like the Ones from 2011
- Information Technology Security
- Secure Business with Online File Backup
- Every day should be Data Privacy Day for your business
- How to Make Your Facebook Account Crime-Proof