Key Considerations for Managing Law Firm Mobile Devices

Key Considerations for Managing Law Firm Mobile Devices

Effective device management is a balancing act between risk, productivity and firm culture: one size doesn’t fit all. In this article we look at common approaches to device management and present key considerations for developing an effective BYOD policy.

 

Protect Your Remote Users with Two-Factor Authentication

Protect Your Remote Users with Two-Factor Authentication

Why you should consider a second layer of security for your firm and client data:

It’s hard to overstate the importance of data security for law firms, particularly as firms work in a more distributed way, with employees regularly accessing sensitive files from home.

How to Spot a Phishing Email

How to Spot a Phishing Email
Law firms are prime targets for fraud and cyberattacks, and incidents are on the rise across the globe, including here in Canada.
 
Not only do lawyers and their staff safeguard sensitive information that can bring a high price on the black market, but they can also provide hackers with a path to a more valuable target: corporate and institutional clients.

“End of Life” Servers: What are Your Options?

“End of Life” Servers: What are Your Options?

You've been told your law firm’s servers are approaching “end of life” (EOL), and you have to upgrade before warranties expire and the manufacturer withdraws support.

Tips from the Helpdesk: How to Access Your Spam Quarantine

Tips from the Helpdesk: How to Access Your Spam Quarantine
Are you waiting anxiously to receive an important email? You’ve likely checked your junk folder, but have you checked your spam quarantine?
New call-to-action
Private Cloud for Law Firms 10 Questions

Subscribe!