); Press "Enter" to skip to content

Posts published in “Data Security”

Seven Characteristics of a Successful Backup Strategy

tscblog 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

How to protect yourself from Phishing!

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

BYOD (Bring Your Own Device) Policies & Security for the Law Firm – Lunch & Learn

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…