Categories
Blog

Cloud Computing For Lawyers (2019 Introductory Guide)

Cloud Computer Lawyers

Attorneys have unique needs for the storage of information while needing to access data on clients and cases from remote locations. That’s why cloud computing has become such a popular option for lawyers. However, the value of cloud computing needs to be tempered with concerns about security and privacy.

Below is your 2019 introductory guide to cloud computing for lawyers.

What Is Cloud Computing?

Cloud computing is web-based, off-site storage of software and data, and is often referred to as software as a service (SaaS). It allows for access to files and software applications from most mobile devices if there’s an available internet connection.

Among some of the most popular commercial cloud-based storage solutions are Dropbox, Google Drive, OneDrive and iCloud. Some of these services are provided for free and others charge a nominal monthly or annual fee, usually based on the amount of storage required. Housing applications in the cloud usually is best done via a managed IT services provider that can configure and monitor the solution on your behalf.

What Are the Advantages to Cloud Computing?

Cloud computing helps busy attorneys stay connected to information critical to their work. Here’s a closer look at some of the core benefits of cloud computing for lawyers:

  • Access. Attorneys are often working out of the office meeting with clients or appearing in court. When they need access to information, it’s usually an urgent situation. With cloud-based access, attorneys can access necessary information in the moment of need. Wherever there’s an internet connection, lawyers can immediately connect, without needing to email files to one’s self or using hard-to-use remote software to log in.
  • Cost. Cloud computing is predictable and inexpensive, with a flat monthly or annual fee that allows for better collaboration, networking and storage.
  • Backup. Cloud computing provides you with a reliable and protected digital backup of your files and applications, ensuring they are recoverable and usable in the event of software corruption, server failure, human error, natural disaster or cyber attack.
  • Multi-Device Functionality. Cloud computing allows you to access information from any device (smartphones, laptops, desktops or tablets) or operating system. If you use a PC at the office and a Mac at home, there’s no issue.
  • Less Internal IT Costs. When you use cloud solutions, you won’t have to buy, install and maintain servers and other equipment if you were hosting these applications and information yourself. Software licensing is often included in monthly managed IT services, which can monitor your software warranty and renewal terms and timing. Also, cloud solutions provide for automated updating and patching, meaning you’ll have access to new features and updated security measures. The cloud option means less burden on internal IT staffers or the need for expensive one-time service requests by third parties.
  • E-Filing. When your firm needs to file materials with courts or government agencies, digital files — and remote access to them — makes e-filing simpler. There’s no need to convert paper to PDFs or hand-deliver information when required documents can be sent digitally.
  • Scalability. Cloud computing allows for flexible expansion or contraction as your firm’s needs evolve. You quickly can add more storage or reduce your capacity. With the cloud, you will not have to scramble to buy, install and configure a new server or overbuy server space you do not need.
  • Intuitive Use. Setting up a workstation for a new employee takes a lot of time, especially to install software and train them on applications. A cloud-based infrastructure means new users can be added or removed quickly. You can also reduce your PC purchase costs by using simpler devices that cost hundreds less.

How Is Information Secured in Cloud Computing?

Keeping information protected is a moral and legal obligation for attorneys. With cloud computing, you have added security functions and peace of mind.

Lawyers are obligated to provide “reasonable care” to prevent unauthorized disclosures or access to information. However, states have different definitions of “reasonable care” but generally include the following:

  • Data encryption
  • Use of current, best-practice technology
  • Review of service providers’ requirements regarding data ownership and access

Cloud security features can ensure that data is encrypted while in transit or at rest, access is limited and suspicious activity is detected, quarantined and addressed before any serious damage occurs. Some law firms need to meet mandated guidelines for work with government agencies like the Department of Defense or the Central Intelligence Agency. In such cases, cloud security solutions are available that address those mandates through threat detection, machine learning and automated monitoring of data and applications.

What Are the Ethical Concerns Regarding Cloud Computing for Lawyers?

U.S. state ethics commissions have ruled that cloud computing is ethical, as long as the “reasonable steps” and conditions are met. According to a recent article by the American Bar Association, the Iowa Committee on Practice Ethics and Guidelines issued suggested questions attorneys should ask themselves and service providers:

  • Will I have unrestricted access to the stored data?
  • Have I stored the data elsewhere so that if access to my data is denied I can acquire the data via another source?
  • Have I performed due diligence regarding the company that will be storing my data?
  • Is it a solid company with an excellent operating record, and is its service recommended by others in the field?
  • In which country and state is it located, and where does it do business?
  • Does its end user’s licensing agreement (EULA) contain legal restrictions regarding its responsibility or liability, choice of law or forum, or limitation on damages?
  • Likewise, does its EULA grant it proprietary or user rights over my data?
  • What is the cost of the service, how is it paid, and what happens in the event of nonpayment?
  • In the event of a financial default, will I lose access to the data, does it become the property of the SaaS company, or is the data destroyed?
  • How do I terminate the relationship with the SaaS company?
  • What type of notice does the EULA require?
  • How do I retrieve my data, and does the SaaS company retain copies?
  • Are passwords required to access the program that contains my data?
  • Who has access to the passwords?
  • Will the public have access to my data?
  • If I allow nonclients access to a portion of the data, will they have access to other data that I want to be protected?
  • Recognizing that some data will require a higher degree of protection than other data, will I have the ability to encrypt certain data using higher-level encryption tools of my choosing?

Attorneys can gain considerable benefits with a cloud computing solution. Knowing the benefits, security provisions and due diligence to be done will help attorneys make an informed decision that keeps information accessible and safe.

Categories
Blog

Password Management For Law Firms (Questions/Answers)

We can’t function without passwords. So much of the internet is built on the concept of a username plus a password that the concept is core to users’ internet experience. It’s a clever but imperfect system that could certainly be improved upon, but until a game-changing replacement comes along, we have to play the game.

Password Management

There’s a lot that doesn’t work very well about this system, and many people have questions about what password management best practices are. To that end, here’s a Q&A about passwords and password management.

What’s the biggest problem with how people use passwords?

The biggest problem with internet passwords is password management. Users have dozens if not hundreds of username/password combinations that they need for personal and business use. The problem with this is that nearly no one can reliably remember one hundred unique passwords. Many users, then, select overly simple (and easy to guess) passwords, or they reuse passwords across many sites.

What’s wrong with reusing passwords?

We live in a world of data breaches. When (not if) someone hacks favorite retailer or hotel chain, it’s embarrassing for those companies, but probably doesn’t affect your life too much. If the culprits gain access to your username and password for those sites, it’s a nuisance, but the amount of damage they can do is limited.

But when your hotel rewards password is the same as your credit card password and your banking password, you could have a mess on your hands. Scammers know that at least 51% of people reuse passwords, and you can bet they’ll try those stolen passwords on other, more valuable sites.

What makes a strong password?

A strong password is one that neither human nor machine can guess easily. Forbes compiles an annual list of the worst passwords being widely used, and it’s topped with gems like password123456, and qwerty. These are terrible because they’re just about the first things a human might guess. Other bad choices on the human front are the names of people, pets, or places that everyone knows are meaningful to you.

On the machine side, the shorter and simpler the password, the easier to hack. Make your password harder to brute-force by adding length, capital letters, numbers, and symbols. A password of 12 to 16 characters that mixes all these character types is generally considered a strong password.

I just keep my passwords on a sticky note. What’s wrong with that?

In short, everything. A sticky note hidden under your keyboard isn’t exactly a state secret. Think about who might have momentary access to see that sticky note. Clients? The cleaning crew? Maintenance personnel? Who else? This is especially disconcerting In the legal world, where those passwords could give a bad actor access to confidential materials that are under attorney/client privilege.

How can I remember passwords like j#%3M82*mRz!+?

Truthfully, you probably can’t. While that’s a tough password to crack, it’s not very useful for you. A better approach is to take a phrase that you can remember (perhaps one that relates in some tangential way to the site you’re on), and then make the phrase longer and more complex.

For example, iloveturtles is an easy phrase to remember, but it’s not that challenging to guess or to crack. Mix up the phrase by adding replacement characters, like <3iL0v3TurtleS<3, and neither your office mate nor a computer will easily guess or break your password.

Admittedly, this method has limits. Your own memory can be an obstacle, and sites vary with which characters they’ll allow in passwords.

I can’t remember 100 unique, complex passwords. What are my options?

Passwords need to be complex, and you shouldn’t reuse them from site to site. This creates a problem: Who can remember them all? One option that’s gaining a lot of traction in both the personal and enterprise markets, including in the law and legal tech fields, is using a password management tool. You’ve likely seen these advertised as “the last password you’ll ever need” or “one password to rule them all”; stuff like that. Password management tools are a reliable, secure way to generate and remember unique, complex passwords for all the sites and accounts you have.

How does a password management tool work?

Password management tools vary a little bit in terms of functionality, but at the core the services are similar.

  1. First, you input or import all your existing credentials to the password management tool.
  2. Next, you turn all your current weak passwords into strong ones. Some password management tools can do this automatically for you on many websites.
  3. Last, you create one strong, secure password for your password management tool account.

After you’ve completed these steps, you’ll have just one password to remember—the password to your password management tool. It will store the rest of your credentials in a secure, encrypted vault and use them to log you into whatever account you need.

Are password management tools secure?

Yes. The companies offering these tools would be sued out of existence if not. Don’t believe us? Check out what a panel of experts has to say on the topic.

Conclusion

If you have additional questions about implementing a password management tool in your law office, contact us today. We’re here to help.

Categories
Blog

Why Reusing Passwords Is A Horrible Idea

Legal Password Management

No matter your profession, reusing passwords is a horrible idea. It’s dangerous and insecure. Reusing passwords is especially problematic for those working in fields like law, ones that require confidentiality in one form or another.

Many people already know that reusing passwords is unsafe, but they do it anyway. One recent survey conducted by Lastline revealed that nearly half (around 45%) of information security professionals polled admit to reusing passwords. These people get paid to work in information security, and yet they don’t follow some of the most basic protocols for keeping information safe.

If anyone should understand the dangers here, it would be information security professionals. You’re likely not an information security pro, though, so let’s look in greater detail at why reusing passwords is so bad.

A Broken System

First, cut yourself a little slack. The internet password system is inherently broken. Most people have well over a hundred digital accounts. These range from the seemingly trivial (paying a utility bill, “store insider” loyalty programs, and the like) to the vitally important (banking, proprietary business accounts, and so on). Each one requires a username and a password. To make things worse, many sites require a mix of characters (capital and lowercase letters, at least one number, and at least one symbol). Some sites won’t accept all the special characters, and various sites won’t even agree about which special characters are acceptable!

Cheating Ensues

Most people can’t easily memorize one hundred or so unique sets of site plus username plus password, so they cheat. Either they write all their passwords down in a notebook or they reuse the same password across multiple sites. Even worse, they may do both!

The Frequency of Reusing Passwords

How widespread is reusing passwords, really? A massive study from researchers at Virginia Tech found that the problem is quite severe. They analyzed 61.5 million passwords spread out over 28.8 million users and found that over half (52%) reused passwords wholesale. That doesn’t even account for people reusing the same basic word or phrase and just switching out a few characters or adding a new one to the end.

The Problem with Password Reuse

Here’s the problem with password reuse: credentials have a habit of being stolen. Companies frequently experience hacks where customer data is exposed. You may not consider it such a big deal if hackers got ahold of your username and password for Bargains ’R’ Us. You don’t shop there often and you don’t have any credit card info stored on their website. Is it really a big deal?

On its own, it’s likely not a very big deal. But if you reused the same username and password for, say, your bank or your credit card, it’s suddenly a very big deal!

The same goes for the sticky-note users out there. If you’ve ever written down your “go-to” password on a sticky note or in a notebook, consider who all has had access to that information. Family? Friends? Coworkers? The cleaning crew or service technicians? How easy would it be for someone to snag a quick picture of your password list? If you reuse your passwords, this problem escalates quickly.

One more problem worth noting is messaging or emailing passwords. Many of us have had the experience of texting, emailing, or messaging a password to a spouse or significant other. Those communications aren’t always secure, though, and often they stick around for a while. If someone gained access to your email, would they also gain access to sensitive passwords?

The Ubiquity of Data Breaches

Data breaches are happening all over the place, and some of them are huge. Yahoo had every single one of its 3 billion accounts breached. If you had a Yahoo account at the time of the breach, even an old dead one you never check, hackers may now have your sign-in info. If you used your go-to password on that account, then every other account you’re using that password for is now at risk. This is a big deal.

Solutions to the Password Problem

Passwords are a mess, and not reusing passwords is difficult. Here are some solutions that can help you clean up the mess and reduce frustration.

Enable Two-Factor Authentication Wherever Possible

Many websites offer two-factor authentication (2FA), which is much more secure. With 2FA, a one-time code is sent in a text message or email after logging in with username and password. Enable 2FA wherever possible.

Use a Password Manager

Password managers solve the problem of memorizing hundreds of unique passwords. They store all your passwords in an encrypted vault that you secure with one strong master password. We recommend using a good password manager. Doing so makes strong password security easy.

Conclusion

Understanding the danger behind reusing passwords is an important first step in securing your digital life. For help securing your workplace against digital threats, enlist the help of professionals like us. Contact us today to learn how we can help keep your systems secure.

Categories
Blog Cyber Security Blog

Dallas Law Office Reaches Out To Data Magic For Fortinet Support

Keeping data and applications safe is important for any business, but especially for law firms. Law practices have an ethical and legal obligation to keep client files safe, secure and protected. To do so requires advanced security measures designed to keep cybercriminals from accessing, stealing and using personal information.

Law firms that fail to protect client data face disaster, with the loss of clients, reputations and revenues. They may also face legal exposure and costly litigation.

Recently a small law firm contacted Data Magic Computer Services. The law firm was looking for a Dallas-area managed service provider to install and manage Fortinet, a leading firewall product line designed to protect networks, systems and users. The firm, with about 20 employees, wanted to make sure it had the right security protocols in place and could have those measures installed as soon as possible.

Of particular concern to the company was the risk of ransomware attacks on any of its 20 computers. Keeping those threats at bay is a critical issue for many small businesses today.

What Is Fortinet?

Fortinet is a company that offers comprehensive security solutions. Their products provide wireless network security, infrastructure protection, application security, access management, cloud security, threat detection and prevention, email security, endpoint security and analytics.

Fortinet is best known for its next-generation firewall products, designed to keep wireless networks secure. These firewall products also include monitoring services designed to detect and alert administrators of problems or suspicious activity.

What Is Fortinet Support?

Like many technology companies, Fortinet relies on a network of local companies to deploy, configure, monitor and manage its products. Data Magic Computer Services partners with Fortinet to provide top-of-the-line security solutions to our clients. We are there not only for the installation of your Fortinet solution but also to provide ongoing Fortinet support for your business.

What Is a Managed Firewall?

Fortinet is a type of protection called a firewall. These services are designed as the first line of defense against cyberattackers. Firewalls are a part of your computer system or network that blocks unauthorized access while allowing outward communication. Firewalls can also prevent employees from accessing inappropriate or dangerous websites that threaten security and productivity.

Firewalls also provide valuable insights into the type of people, good or bad, who are targeting your business.

Monitoring your network and system is a time-intensive, resource-intensive task, and one that most companies are unlikely to invest in internal resources to cover. That’s where managed firewall support services come in.

Managed firewalls are provided by trained managed IT services professionals. These services provide for continual monitoring and threat detection, containment and reporting. Managed firewall experts know what typical network traffic looks like and can detect suspicious activity quickly before significant damage can occur. They can also analyze and interpret activity reports to give your business leaders valuable and actionable insights.

What Are the Advantages of Fortinet and Fortinet Support Services?

When you decide to install Fortinet and count on Data Magic for Fortinet support, you gain considerable advantages for your company. The core benefits of a Fortinet solution and Fortinet support services are:

  • Continuous Protection. With Fortinet, your business systems and network are monitored constantly keeping access controlled and data secured.
  • Access Control. Managed firewalls keep unwanted visitors away. Unauthorized visitors are turned away and flagged to prevent future attempts.
  • Compliance. For businesses subject to regulatory compliance matters, Fortinet offers complete safeguards to meet your regulatory obligations. Data from managed firewalls can provide helpful documentation for regulators and Fortinet offers a range of products to meet various regulatory mandates.
  • Complete Security. Your managed firewall solution delivers iron-clad security protection for your network perimeter.
  • Threat Management. A managed and monitored firewall helps keep both external and internal threats neutralized. Detection and identification allow your business to take action against these threats to limit future risk.
  • Improved Availability. A next-generation firewall does more than secure your systems. By blocking traffic that is unwanted, firewalls allow for better network connectivity, speed and performance by authorized users.
  • Application Control. Your Fortinet firewall can be configured to block or rate-limit applications or features from being used on corporate networks via any internet-connected device, improving employee focus and productivity,
  • Content Filtering. Block access to websites that threaten employee productivity, are inappropriate for the workplace or known to be a security threat. Use a threat database to track these websites and categorize them based on your defined content parameters.

Do I Need Other Types of Security for My Business?

Firewalls are an important part of a comprehensive business security strategy. In addition to firewalls, Data Magic provides an array of services to keep your business safe, including:

  • Security assessments that identify vulnerabilities in your technology and recommend solutions.
  • Anti-virus software that prevents viruses, Trojans, worms and other nasty programs from infecting your computers.
  • Anti-phishing solutions that detect suspect emails that are often a ruse looking to gain access or seek gift cards or other monies.
  • Anti-spam filters to keep unwanted emails from clogging employee inboxes, resulting in lowered productivity and distraction.
  • Cloud computing strategies to store your data, applications and operating systems. Data backups of that information are done on set schedules to allow you access to needed information without the risk of significant data loss.
  • Deep web scanning that looks not just at the seedy “dark web” areas, but other areas of the internet that are inaccessible by browsers. Not all of the deep web is bad though the dark web, a portion of the deep web, is where cybercriminals sell stolen personal and financial data. Deep web scanning is focused and broader in scope than dark web monitoring and helps protect reputations, proprietary information and employees.
  • Multifactor authentication that allows for the use of known information (such as a password) and unknown information (such as a randomly generated passcode) that allow for more secure access to sites and applications.

Data Magic Computer Services provides an array of security services, including Fortinet installation, monitoring and Fortinet support. Our security services complement our complete IT solutions, including cloud solutions, managed IT (including software and hardware management and help-desk services), IT consulting, computer repair and software and database development.

To learn more about how Data Magic Computer Services can provide Fortinet support, security services and other technical solutions, https://datamagicinc.com/contact-us/contact us today for a free initial consultation.

Categories
Blog

Internet Browser Tips: Learn Helpful Tips and Tricks for Better, Faster Browsing

You likely spend a lot of your time using an internet browser at work. With so many hours spent online, it helps to know a few shortcuts and tips you can use to make your work more productive. Follow these tips and tricks to get the most out of your browsing experience.

Note: These tips and tricks are designed for use on Google Chrome, which has nearly two-thirds of the browser market share.

How Can I Customize My Browsing Experience?

Web browsers come with many great built-in features. However, you can customize your performance with extensions and plugins that make the browsing experience your own. There are extensions available to improve productivity, block ads, manage tabs and connect directly to other applications. Chrome makes it easy to manage these tools by typing chrome://plugins or chrome://extensions into your address bar.

What Do I Do About a Slow Network Connection?

To save RAM, be sure to install the Data Saver extension, which compresses and optimizes web pages before they load. Also, make sure you have the most current version of Chrome installed. Look for the vertical dots to the right of the address bar to turn from green to yellow to red to indicate how out-of-date your browser is. Go to the address bar, type in chrome://help and follow the prompts.

Can I Simplify Moving to Different Web Addresses?

Several years ago, Google made the address bar a far more powerful part of your browser. You can start typing in search terms in the address bar (known also as the Omnibox) and Google will display popular results. You can also type in a website or a portion of the website and find the most common results. There’s no need to type the “https://www.” portion of the web address in most cases.

How Can I Move Within a Web Page Faster?

If you’re on a page with lots of fields, use the Tab key to move quickly from one field to another. To move backward among fields, use Shift+Tab. A similar approach can be used to move from button to button (helpful if filling out an online form or survey). Click Tab or Shift+Tab to move among buttons, and use the space bar or hit enter to select. Here are a few other page navigation tricks:

  • Press Alt+D or Ctrl+L to move your cursor to the address bar
  • Hit the Ctrl key and + or – to increase or decrease the page text. Ctrl + 0 resets to the original
  • F5 or Ctrl+R lets you refresh or reload the page
  • Want to find text on the page? Hit Ctrl+F
  • If you’re looking to open your bookmarks, press Ctrl+B

How Do I Maintain My Privacy?

There are several things to do to protect your privacy while browsing. The first is to use Chrome’s incognito mode. To open an incognito window, click on the three vertical dots or press Ctrl+Shift+N. The browser will not keep track of your browsing history or store any browsing cookies. You can also delete your browsing history by clicking on the three dots and selecting More tools > Clear browsing data.

Who Can Help Me Optimize My Technology?

Data Magic Computer Services is the leading provider of managed IT and security services for businesses in the metro Dallas area. To learn more about how Data Magic Computer Services can help your company get the most out of its technology investments, contact us today.

Skip to content