
2 minute read
DAVE’S TECH TIPS
dave’s techtips
RoboForm Password Manager: (bit.ly/bt0220p17-6) Dashlane: (bit.ly/bt0220p17-7)
Security Dos and Don’ts
Here are a collection of security dos and don’ts, with links to relevant websites and resources. No amount of software can protect you unless it is combined with proper security policies that are updated as threats emerge and are enforced within your organization.
PASSWORDS:
uuu STRONG PASSWORDS Why you should use a strong password and how to get started using a password manager. (bit.ly/bt0220p17-1)
uuu STRONG PASSWORD GENERATORS Gibson Research: (bit.ly/bt0220p17-2) Secure Password Generator: (bit.ly/bt0220p17-17)
uuu PASSWORD STRENGTH TESTERS The Password Meter: (bit.ly/bt0220p17-3) How Secure is My Password: (bit.ly/bt0220p17-4)
uuu PASSWORD MANAGER SOFTWARE LastPass remembers all your passwords, so you don’t have to: (bit.ly/bt0220p17-5) Better yet, move to MultiFactor Authentication (bit.ly/ bt0220p17-9). If you are on a Mac, then Keychain (bit.ly/bt0220p17-8) is already built into OSX (and can be shared on your different Apple products).
SECURITY TIPS:
uuu DISABLE USB PORTS Prevent malware from being introduced into your system via an infected USB drive: (bit.ly/bt0220p17-10)
uuu RANSOMWARE PROTECTION The 3-2-1 approach to defend against ransomware: (bit.ly/bt0220p17-11)
uuu THE BEST ANTIVIRUS SOFTWARE FOR 2020 Install a top-rated product and keep it up to date: (bit.ly/bt0220p17-12)
uuu WHY SOFTWARE UPDATES ARE SO IMPORTANT Why it is important to install the latest versions of your operating systems and install all updates to protect against emerging vulnerabilities: (bit.ly/bt0220p17-13) uuu CANADIAN ZEROKNOWLEDGE CLOUD-BASED BACKUP SOLUTION Sync encrypts your data in transmission and in storage and only you have the key to unencrypt your data — no one else can read or access your data. Plus, all your data remains in Canada. (bit.ly/bt0220p17-14)
uuu THE 10 STEPS TO CYBERSECURITY — by the UK’s National Cyber Security Centre This site contains a host of articles, guidance, tips and more to protect an organization against threats. (bit.ly/bt0220p17-15)
uuu SANS — INFORMATION SECURITY POLICY TEMPLATES The SANS organization has long been a leader in education, resources, programs and much more in security and IT issues. Here you will find a host of information, including policy templates for twentyseven important security requirements: (bit.ly/bt0220p17-16)
This is just a sampling of the steps and policies that can be taken to protect confidentiality, guard privacy (and prevent privacy breaches), harden technology and safeguard electronic data. The threat landscape is constantly changing as new threats emerge. Practice today means understanding the nature of the threats and how to best take precautions to guard against them.
© 2020 David J. Bilinsky
>>> Continued from page 16
confidentiality and solicitor-client privilege, including… in relation to electronic communications (email, texting, e-documents).” Lawyers are well-advised to read the Pilot Project report, and start to work through the Workbook early in 2020, not just to prepare to complete the mandatory Self-Assessment report but also to take action in hardening their systems, policies and protections against cyber-threats.