Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the gd-system-plugin domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
Security – Alisanne Steele ); Press "Enter" to skip to content

Posts tagged as “Security”

How to Craft a Strong Password and Keep your Data Safe!!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Tuesday, April 3, 2018 There is a ton of information out there about how to create that perfect password.  As long as you follow the rules, your password should be strong and un-crackable.  Or at the very least, your password should be strong enough to outlast a few rounds of brute force attacks…

Why and How Law Firms Should Safeguard Their Clients’ Data

Alisanne Steele 0

TheSoftwareConsultant | Thursday, September 13, 2018 Feature specially written for blog.thesoftwareconsultant.com Feature by: Jean Brandrick Last July, personal security website ASecureLife ranked Nevada as the riskiest state for security theft and it’s not hard to see why. Nevada is known for gambling and spending extreme amounts of money – two very attractive activities for identity thieves and hackers.…

Does your firm BYOD?

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Monday, March 19, 2018 Does your firm BYOD? Bring your own device (BYOD) refers to the policy of permitting employees to bring personally owned mobile devices into the workplace, and to allow them to connect those devices to company assets, information, and/or applications. Mobile devices and your firm’s data: Whether you…

BYOD (Bring Your Own Device) Policies & Security for the Law Firm – Lunch & Learn

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…

3 ways hackers use your employees to their advantage

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 22, 2018 Cyber criminals don’t just slip into your network with the help of some serious hacking skills. In fact, there’s a much simpler way to do that… through your employees. Social engineering is a tactic hackers are using more and more frequently to infiltrate systems. It involves a variety…