Deprecated: Array and string offset access syntax with curly braces is deprecated in /var/www/wp-content/plugins/gravityforms/common.php on line 4151
Security – Alisanne Steele ); Press "Enter" to skip to content

Posts published in “Security”

Crafting a strong password as a Self-Affirmation Statement:

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Rabbit Hole Technology I have been telling clients to use Pass-Phrases for quite some time now, and they usually ask, “what should I use”? I used to respond, “something random, but memorable, and throw in numbers and special characters”.  For example: “H!s Dog $p0t” However, in my most recent round of personal password…

Simple Two-Factor Security That Can Protect Your Data From Compromise

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Thursday, July 26, 2018 Target, Twitter, Time-hop (the list goes on and on) have had data breaches exposing multi-millions of user’s personal and financial information to bad actors.  However, this personal data is just one part of the puzzle if your accounts are protected by additional layers of security.  Two-Factor Authentication could protect…

7 Characteristics of a Successful Backup Strategy

Alisanne Steele 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

Why and How Law Firms Should Safeguard Their Clients’ Data

Alisanne Steele 0

TheSoftwareConsultant | Thursday, September 13, 2018 Feature specially written for blog.thesoftwareconsultant.com Feature by: Jean Brandrick Last July, personal security website ASecureLife ranked Nevada as the riskiest state for security theft and it’s not hard to see why. Nevada is known for gambling and spending extreme amounts of money – two very attractive activities for identity thieves and hackers.…

The Verizon Mobile Security Index (2018) and why it matters to your firm

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Thursday, August 2, 2018 Verizon recently released its Mobile Security Index report highlighting the difficulty businesses face in balancing convenience and user experience with security concerns and the reality of today’s internet environment that is filled with risk. The report finds that Companies are sacrificing mobile security for convenience and performance.  Companies that…

Seven Characteristics of a Successful Backup Strategy

Alisanne Steele 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

How to protect yourself from Phishing!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

BYOD (Bring Your Own Device) Policies & Security for the Law Firm – Lunch & Learn

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…