Alisanne Steele | TheSoftwareConsultant | Rabbit Hole Technology I’ve been recommending pass-phrases to clients for years. One of the first questions I usually hear is:“What should I use?” My go-to advice used to be: “Something random but memorable—and make sure to throw in a few numbers and special characters.” For example:H!s Dog $p0t That approach still works—and it’s…
Posts published in “Data Security”
Alisanne Steele | TheSoftwareConsultant | Rabbit Hole Technology Bring Your Own Device (BYOD) is no longer a trend—it’s the new normal. Whether your firm fully embraces BYOD, provides company-owned devices, or operates a hybrid model, one thing is clear: mobile devices now play a central role in business operations. But with convenience comes risk. When employees access firm…
Alisanne Steele | TheSoftwareConsultant | Thursday, July 26, 2018 Target, Twitter, Time-hop (the list goes on and on) have had data breaches exposing multi-millions of user’s personal and financial information to bad actors. However, this personal data is just one part of the puzzle if your accounts are protected by additional layers of security. Two-Factor Authentication could protect…
Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…
Alisanne Steele | TheSoftwareConsultant | Thursday, August 2, 2018 Verizon recently released its Mobile Security Index report highlighting the difficulty businesses face in balancing convenience and user experience with security concerns and the reality of today’s internet environment that is filled with risk. The report finds that Companies are sacrificing mobile security for convenience and performance. Companies that…
Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…
Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…