-
February 11, 2020 Article
Lock Down Your Login
The process of authentication, or proving who you are, is key to protecting your information, such as your email, social Read More
-
January 21, 2020 Article
Staying Secure on the Road
We want you to be able to make the most of technology at all times, including when you travel. In Read More
-
January 14, 2020 Article
Smart Home Devices
What are Smart Home Devices? Traditionally only a few of your devices at home could connect to the Internet, such Read More
-
November 17, 2019 Article
Things You Should Know About Free Email & File Sharing Cloud Services
By: Karla J. Eckardt, Practice Management Advisor The Florida Bar’s Standing Committee on Technology has annotated The Legal Cloud Computing Read More
-
September 24, 2019 Article
Stop That Malware
You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These Read More
-
August 6, 2019 Article
Securely Using Mobile Apps
Mobile devices, such as tablets, smartphones, and watches, have become one of the primary technologies we use in both our Read More
-
February 19, 2019 Article
Helping Others Secure Themselves
Many of us feel comfortable with technology, to include how to use it safely and securely. However, other coworkers, friends Read More
-
January 29, 2019 Article
Search Yourself Online
Overview You most likely have heard how important it is to protect your privacy and the information you share online. Read More
-
January 25, 2019 CLEVideo
Technology Ethics for Attorneys
Course Number 3239 CLE Approved for 1 hour of General CLE Credit, 1 hour of Technology, and 1 hour of Read More
-
November 20, 2018 Article
Social Engineering
A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to Read More
- View All