The following is a guest blog post by Perry L. Segal, an attorney and management consultant at Charon Law, Redwood City. Mr. Segal has over 25 years of combined experience in law and technology. He is co-chair of the California Council of State Bar Sections, special advisor and past-chair of the Law Practice Management and Technology Section Executive Committee, and a member of the bar’s Social Media Task Force.
Few technologies create more puzzlement and worry for attorneys than “the cloud.” Attorneys, quite reasonably, want to know how they can stay on the right side of their ethical obligations when it comes to using it. As always, attorneys need to practice in accordance with the standard of reasonable care and effort. But there’s a caveat: Attorneys will be charged with the standard of an attorney who is competent in the understanding and use of technology. What does this actually mean? And as a practical matter, what can an attorney do? Continue reading
Given the increasingly digital landscape
of today’s economy, the most valuable asset for many businesses is their computer data. According to a 2015 study, the average cost of a data breach for small businesses is about $38,000 in hard costs and can total upwards of $55,000. Yet many businesses opt only for traditional property insurance policies. This could be a big problem for your client’s small business.
It has been clear for some time that cybercrime isn’t an outlier in the spectrum of corporate risk. Yet many organizations have been slow to wake up to that reality, or having awoken, are unsure of what steps to take to manage that risk. Law firms are in the thick of it with nearly half of all firms infected with viruses, spyware, or malware last year. Continue reading
On February 12, 2013, President Obama signed a long-expected Executive Order titled “Improving Critical Infrastructure Cybersecurity.” Here’s a look at what it does and what it covers. Continue reading
Unfortunately, we have all had to become somewhat knowledgeable about cyberattacks, even if only to be sure our anti-viral software is up-to-date. But do you really know what the different cyberattack terms mean? Here’s a quick overview of cyberattack language and what it all means. Continue reading