9781634254144-1634254147-Locked Down: Practical Information Security for Lawyers

Locked Down: Practical Information Security for Lawyers

ISBN-13: 9781634254144
ISBN-10: 1634254147
Edition: 2nd
Author: Sharon D. Nelson, John W. Simek, David G. Ries
Publication date: 2016
Publisher: American Bar Association
Format: Paperback 370 pages
FREE US shipping

Book details

ISBN-13: 9781634254144
ISBN-10: 1634254147
Edition: 2nd
Author: Sharon D. Nelson, John W. Simek, David G. Ries
Publication date: 2016
Publisher: American Bar Association
Format: Paperback 370 pages

Summary

Locked Down: Practical Information Security for Lawyers (ISBN-13: 9781634254144 and ISBN-10: 1634254147), written by authors Sharon D. Nelson, John W. Simek, David G. Ries, was published by American Bar Association in 2016. With an overall rating of 3.9 stars, it's a notable title among other books. You can easily purchase or rent Locked Down: Practical Information Security for Lawyers (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $1.85.

Description

In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? This second edition of Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget. Written in clear, non-technical language that any lawyer can understand, this book will help you:

  • Create secure password--and store them safely
  • Assess the existing security risks at your firm: server rooms, cleaning crews, guests, alarm systems, and more
  • Work securely from a laptop or smartphone
  • Protect your mobile devices from theft
  • Authenticate users and encrypt your data
  • Maintain e-mail integrity
  • Secure your wired or wireless network
  • Effectively wipe data from a hard drive before disposal
  • Develop an information security checklist for your firm
  • Investigate, contain, and recover from a security breach
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book