A Safer Way to Store Files Online by Suzanne Kantra
Encryption Made Simple for Lawyers by David G. Ries & John W. Simek
FYI: Playing it Safe With Encryption from the ABA Legal Technology Resource Center
Examples of Encryption Software:
PGP (Pretty Good Privacy)
Reporting Cyber Crime
USDOJ Cyber Crime Reporting
Wiping or Sanitizing Hard Drives
CyberCide from CyberScrub
Darik's Boot and Nuke freeware
WipeDrive from WhiteCanyon
Drive eRazer - standalone solution for erasing data from a hard drive. No PC necessary.
Spyware, Adware & Viruses
Many computer security experts believe the greatest threat today comes not from viruses sent as email attachments but from spyware added to unsuspecting users' PCs while they browse on the Web. Spyware, as the name suggests, is any technology that aids in gathering information about a person or organization without their knowledge, usually for a malicious purpose. Some distinctions may be made between spyware and adware. Adware is software that displays advertisements on a user's PC while a program is running, but is also capable of tracking a user's personal information and passing it on to third parties, without the user's authorization or knowledge.
A common misconception is that antivirus and firewall software can catch all spyware and adware. Unfortunately, this is not so. Computer users need to be responsible for checking for spyware on their PCs by utilizing software that scans for and removes spyware and adware.
Examples of Free Spyware Removal Tools:
Spybot Search and Destroy
Free Spyware and Adware Detection & Removal Software
Convenience or Security: You Can't Have Both When it Comes to Wi-Fi
Michael Kassner, TechRepublic
Directions for Enabling Security Featurs on Wireless Access Points
Tie Down That Wi-Fi: Security in Public Requires Vigilance
Dennis Kennedy, ABA Journal
Guide to Securing Your Wireless Network
Wi-Fi Security Risks for Lawyers
Five Ways to Protect Yourself from Wi-Fi Honeypots
The 5 Best Programs to Protect Your Online Data
10 Worst-Case BYOD Scenarios (And How to Prevent Them)
Dropbox 102: Security Steps
Good and Bad Passwords How-To An in-depth analysis of good, bad, strong and weak passwords, password cracking techniques and how to reduce password vulnerabilities.
How to Password Protect and Encrypt Microsoft Office 2010 Documents
Layering Security: Two Factor Authentication by Catherine Reach
Microsoft security article
Mobile Device Security - Don't forget that mobile devices get viruses too.
Symantec Security Response
Check the latest virus threats and computer security advisories
Security Policies Must Address Legal Implications of BYOD (Bring Your Own Device)
Suggestions for Selecting Good Passwords
Article in CERN Computer Newsletter by Lionel Cons
Software - Firewall and Antivirus
AVG Anti-Virus (free and subscription)
Sophos Anti-virus and anti-spam for business
Symantec's Norton security for home & home office, security for small & mid-sized business, and enterprise security products.
Microsoft Security Essentials (free)
ZoneAlarm - Click here to read a review of ZoneAlarm.