Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader Guide, Feedback, and Issue Reporting

Preventing Your Worst "Tech" Nightmare: Protecting Your Firm and Clients from Cybercriminals - The Right Way

Presented by Tom Kirkham & Doug Brown

(3,536 Ratings)
LexVid

Watch This Course for Free!

New LexVid members can watch their 1st course for free. No credit card needed, just create an account and you'll receive your certificate immediately after watching your free course.

Already a member? Sign in
Video Player is loading.
Slides
move
Loaded: 0%
Current Time 0:00
Reverse 15 SecondsForward 30 SecondsFull Screen

Course Description

Length: 1h 2min    Published: 9/14/2022    
No one likes to think about the worst happening, but when it comes to your firm's technology, it's always better to be safe than sorry. That's why we're here to present Preventing Your Worst Tech Nightmare: Protecting Your Firm & Clients from Cybercriminals - The Right Way, a course that will help you protect your business and clients from the perils of cybercrime. This course covers everything from cybersecurity myths that can cripple your firm to attorneys' ethical obligations to be technically competent. You'll learn exactly how to secure your practice against cyberattacks, and you'll be equipped with the leadership skills you need to create a security-first culture for your firm.
Learning Objectives
* Understand the common flaws that can put a law firm at risk of cyber-attack
* Learn about a lawyer's ethical obligations when it comes to law firm cybersecurity
* Know how to create a security-first culture for your law firm
Read the course transcript.

Speaker Q&A

Question
How do I get encryption on my hard drives?
- GeorgeM
Answer
Encrypting your hard drives is a crucial step in protecting sensitive data. Most modern operating systems offer built-in encryption tools to make this process straightforward. On Windows, you can use BitLocker, and on macOS, FileVault is the go-to option. For external drives, encryption can typically be enabled directly through your operating system’s settings. Remember, encryption works best when paired with strong passwords and secure storage for your encryption keys. These steps ensure that your data remains safe, even if your device is lost or stolen
- Tom Kirkham

Presented By:

Tom Kirkham

Fayetteville, Arkansas

479.242.2804

kindsey.haynes@irontechsecurity.com

Doug Brown

Bluffton, South Carolina

doug@summit-success.com

Featured Reviews

"The cross-discipline approach, leadership consulting + infused BMPs, is very effective and interesting. I learned a lot."

   John S