SlideShare a Scribd company logo
1 of 1
Cyber Security Tips for Small Firms
A liability insurance provider for small law firms recently launched a blog series on tips to avoid data
breaches.
Mark Gerlach, Law Technology News
May 1, 2014 |0 Comments
Protexure Lawyers began a blog series last month on tips for beefing up cyber security at small practices.
“There are some basic things that small firms can do to protect themselves,” said Kyle Nieman, president and CEO of AmerInst Professional Services, in an LTN interview.
Attorneys that do not properly protect client information may be at risk of malpractice, Nieman said.
Protexure Lawyers is a liability insurance program for small law firms with less than five attorneys. Lisle, Ill.-based AmerInst Professional Services, a subsidiary of AmerInst
Insurance Group, works with Crum & Forester to offer Protexure.
Dubbed the Tech Blog Series, the posts cover topics including firewall and password protection, choosing an anti-virus and e-mail security. Protexure has another blog entry in
the works on personal identification information, which is likely to be released next week, according to Nieman.
Law firms should select firewalls based on criteria such as: the number of computers a firm has in its network; whether or not the firewall has an International Computer Security
Association (ISCA) certification; price; and the level of technical support that is provided, according to the Protexure Lawyers blog. According to Protexure, a firewall with 10
megabytes of random access memory is sufficient for a firm with less than 50 employees.
Other useful tips in the Protexure’s Tech Blog Series include:
Firms should run their anti-virus programs through third-party testing sites, such as AV-Comparatives.org or AV-Test.org, to evaluate the effectiveness of the software in fighting
viruses, adware and malware without slowing down a computer.
Personal and business e-mail accounts should not be linked, or have similar usernames and passwords. In many instances business e-mail accounts are secured with
encryption and other tools to safeguard content, unlike personal accounts. If a hacker breaks into a personal e-mail that is linked to a business account, or that contains work-
related correspondences and files and data, sensitive information could be at risk of infiltration.
Passwords should avoid using common names, phrases, sports teams, etc.

More Related Content

What's hot

Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionYustinus Simon
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security Seclore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | SecloreSeclore
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya RansomwareSiemplify
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadJochen Kressin
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustrySeclore
 

What's hot (20)

Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_lossprevention
 
Secure Cloud Reference Architecture
Secure Cloud Reference ArchitectureSecure Cloud Reference Architecture
Secure Cloud Reference Architecture
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is dead
 
Data security
Data securityData security
Data security
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 

Viewers also liked

How To Track Your Company's Fuel Usage, The Automated Way
How To Track Your Company's Fuel Usage, The Automated Way How To Track Your Company's Fuel Usage, The Automated Way
How To Track Your Company's Fuel Usage, The Automated Way Broderic Fernow
 
Keynote technicals currency intraday levels for 231112
Keynote technicals currency intraday levels for 231112Keynote technicals currency intraday levels for 231112
Keynote technicals currency intraday levels for 231112Keynote Capitals Ltd.
 
Izm 2 stb 977 pz pr_or
Izm 2 stb 977 pz pr_orIzm 2 stb 977 pz pr_or
Izm 2 stb 977 pz pr_orMasen Rollins
 
El conocimiento de las tic's
El conocimiento de las tic'sEl conocimiento de las tic's
El conocimiento de las tic'sLizeth Barragán
 
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...City & Bits GmbH
 

Viewers also liked (11)

La letra T
La letra TLa letra T
La letra T
 
My last summer
My last summerMy last summer
My last summer
 
나는 나다
나는 나다나는 나다
나는 나다
 
Decalogo
DecalogoDecalogo
Decalogo
 
How To Track Your Company's Fuel Usage, The Automated Way
How To Track Your Company's Fuel Usage, The Automated Way How To Track Your Company's Fuel Usage, The Automated Way
How To Track Your Company's Fuel Usage, The Automated Way
 
Coursera cryptography 2015
Coursera cryptography 2015Coursera cryptography 2015
Coursera cryptography 2015
 
Keynote technicals currency intraday levels for 231112
Keynote technicals currency intraday levels for 231112Keynote technicals currency intraday levels for 231112
Keynote technicals currency intraday levels for 231112
 
Izm 2 stb 977 pz pr_or
Izm 2 stb 977 pz pr_orIzm 2 stb 977 pz pr_or
Izm 2 stb 977 pz pr_or
 
El conocimiento de las tic's
El conocimiento de las tic'sEl conocimiento de las tic's
El conocimiento de las tic's
 
8.1
8.18.1
8.1
 
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...
Portalsymposium City&Bits - kommunales Datenmanagement in Intrexx - Zuständig...
 

Similar to Cyber Security Tips for Small Firms

Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Network security
Network securityNetwork security
Network securityROBERT S
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxInfosectrain3
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataPistoia Alliance
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems- Mark - Fullbright
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 

Similar to Cyber Security Tips for Small Firms (20)

Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Network security
Network securityNetwork security
Network security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Data security
 Data security  Data security
Data security
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 

Cyber Security Tips for Small Firms

  • 1. Cyber Security Tips for Small Firms A liability insurance provider for small law firms recently launched a blog series on tips to avoid data breaches. Mark Gerlach, Law Technology News May 1, 2014 |0 Comments Protexure Lawyers began a blog series last month on tips for beefing up cyber security at small practices. “There are some basic things that small firms can do to protect themselves,” said Kyle Nieman, president and CEO of AmerInst Professional Services, in an LTN interview. Attorneys that do not properly protect client information may be at risk of malpractice, Nieman said. Protexure Lawyers is a liability insurance program for small law firms with less than five attorneys. Lisle, Ill.-based AmerInst Professional Services, a subsidiary of AmerInst Insurance Group, works with Crum & Forester to offer Protexure. Dubbed the Tech Blog Series, the posts cover topics including firewall and password protection, choosing an anti-virus and e-mail security. Protexure has another blog entry in the works on personal identification information, which is likely to be released next week, according to Nieman. Law firms should select firewalls based on criteria such as: the number of computers a firm has in its network; whether or not the firewall has an International Computer Security Association (ISCA) certification; price; and the level of technical support that is provided, according to the Protexure Lawyers blog. According to Protexure, a firewall with 10 megabytes of random access memory is sufficient for a firm with less than 50 employees. Other useful tips in the Protexure’s Tech Blog Series include: Firms should run their anti-virus programs through third-party testing sites, such as AV-Comparatives.org or AV-Test.org, to evaluate the effectiveness of the software in fighting viruses, adware and malware without slowing down a computer. Personal and business e-mail accounts should not be linked, or have similar usernames and passwords. In many instances business e-mail accounts are secured with encryption and other tools to safeguard content, unlike personal accounts. If a hacker breaks into a personal e-mail that is linked to a business account, or that contains work- related correspondences and files and data, sensitive information could be at risk of infiltration. Passwords should avoid using common names, phrases, sports teams, etc.