Law Practice Management and Technology
The Bottom Line Volume 35, No. 2, April 2014
Content
- Adopting Word 2013 at Your Law Firm
- Coach's Corner: Exercise Your Business Acumen
- E-Mail Efficiency, Time Management and Mobile Communication Courtesy in 2014
- Everything Old Is New Again
- MCLE Self-Study Article Disaster Preparedness Guidelines for Law Practices
- Message From the Editors
- New Member Benefit: TechnoLawyer ArchiveĀ®
- Press Release: Attorney General Kamala D. Harris Issues Guide for Small Businesses to Protect Against Cyber Attacks, Data Breaches
- The Dangers of āBring Your Own Cloudā (Byoc) During e-Discovery
- Message From the Chair: Cybersecurity in the Golden State
Message From the Chair: Cybersecurity in the Golden State
By Tangela Terry, Esq.
Law Office of Tangela D. Terry
In February of this year, Attorney General Kamala D. Harris released, âCybersecurity in the Golden State,â it is a guide designed to educate small businesses on how to protect against cyberattacks and data breaches (link to guide- https://oag.ca.gov/cybersecurity).
Small business owners are using wireless technology and smartphones for their operations more than ever. 98% of small businesses report that they use wireless technology and 85% of small businesses reported using smartphone for their operations. (Cybersecurity in the Golden State citing 2013 AT&T Small Business Technology Poll, AT&T Inc. (as of Jan. 9, 2014). ). While it is important to use these forms of technology, it is equally if not more important to make sure that you safeguard against cyberattacks. The SBA Office of Advocacy reported that in just the first three months of 2013, there were more than one billion cyberattacks (Cybersecurity in the Golden State citing SBA Office of Advocacy, âAdvocacy Points out Small Business Concerns Regarding the Preliminary Cybersecurity Frameworkâ, (as of Jan. 9, 2014).
If you are a solo practitioner or run a small to medium sized law firm, I highly recommend that you read the guide. Listed below are practical steps that the authors recommend that you follow to minimize cyber vulnerability.