- 
                     January 25, 2019 CLEVideo January 25, 2019 CLEVideoTechnology Ethics for AttorneysCourse Number 3239 CLE Approved for 1 hour of General CLE Credit, 1 hour of Technology, and 1 hour of Read More 
- 
                     November 20, 2018 Article November 20, 2018 ArticleSocial EngineeringA common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to Read More 
- 
                     November 6, 2018 CLEVideo November 6, 2018 CLEVideoLegalFuel Speaker Series: Cybersecurity for the Everyday LawyerCOURSE NUMBER 3128 CLE Approved for 1.0 hours of General CLE Credit including 1.0 hours of Technology CLE credit and Read More 
- 
                     November 6, 2018 CLEPodcast November 6, 2018 CLEPodcastWhat Lawyers Need to Know about CybersecurityLawyers are in the business of holding sensitive and personal information, so they are prime targets for data breaches. Do Read More 
- 
                      
- 
                     June 28, 2018 Article June 28, 2018 ArticleComputer Virus and Malware ProtectionThe potential damage caused by computer malware, viruses and worms, should be considered by all attorneys in implementing an information Read More 
- 
                     June 28, 2018 Article June 28, 2018 ArticlePublic Wi-FiWith the prevalence of mobile device use and on-the-go communications, attorneys must be aware of the security challenges associated with Read More 
- 
                     May 24, 2018 Article May 24, 2018 ArticleOnly Use Trusted Wi-Fi NetworksOnly Use Trusted Wi-Fi Networks When Connecting to the Internet. Using a public Wi-Fi network not only puts your devices Read More 
- 
                     May 21, 2018 Article May 21, 2018 ArticleKeep Sensitive Data SecureWith major data breaches being reported all too frequently, organizations are now placing increased emphasis on the security of personal, Read More 
- 
                     May 10, 2018 Article May 10, 2018 ArticleCommon Security Myth – I Don’t Have Anything a Hacker Would WantYes, you do. Hackers want to control your PC to send spam, distribute malware, or help launch a denial of Read More 
- View All
