Monday
Feb112013

Recycling or selling a old device, make sure that your information is off it

With the ever increasing pace of technological advancement, the question of what to do with old devices is brought up.  Many clients I work with are not aware of the risks of selling or recycling an old device without being 100% sure all personal information is off it.  Cell and smart phones, tablets, laptops, and computers all carry personal information of one sort or another, even deleting this information may not make it inaccessible.   Check out the story below, 

Best case scenario a TV station does a news report on the computer that they purchased from you, worst case might be this, 

Collaboration Lab provides several solutions to address removal and / or destruction of personal information off of your electronic device.  Don't risk the chance of your personal information being used, distributed, and exploited, contact us today.

Thursday
Feb072013

Red Team USA Cyber Security Workshop for Lawyers

"Law firms are a very attractive target for cyber attacks by anyone seeking sensitive information," says Bradford A. Bleier, Unit Chief, Cyber National Security Section, FBI Cyber Division.

Today, Every Law Practice is “A Cyber Security Risk.” High Costs Can Result From Failure To Implement The Recent ABA Client Confidentiality Rules & Cyber Data Protection.

Today’s Cyber Criminal designs programs to attack and steal from specific business types. Law Firms are no exception, in fact, they are prime targets for a Cyber Security attack.

Data breaches, privacy infringements, and theft of intellectual property or other sensitive organizational data come at a tremendous cost. Some government reports estimate that cyber breaches cost the U.S. economy over $1 trillion annually. Businesses that are victimized by Cyber Intrusions risk significant liability in fines, penalties, and damages.

This workshop examines the potential legal liability for data breaches and not implementing state-of-the-art cyber security protection:

- In today's world what are "reasonable" efforts when it comes to preventing disclosure or access to client information.

- Do I notify all my clients that we've had a security breach of our network?

- One of our associates loses his USB thumbdrive - does that constitute a security breach?


Discussions: Are you using Cloud services or thinking about it? Do you use mobile devices? Who has access to your network? Do you and your clients send sensitive attorney-client privileged information back and forth over regular email? Do you know how easy it can be compromised? What are your ethical and legal duties to protect client-confidentiality when using technology?

 

Presenter: David Willson

JD, CISSP, Security+

Titan Info Security Group

(A Cyber Security Law Firm)

What You'll Learn:

- Overview of threats and vulnerabilities to data in 2013

- Ethics Rules for Lawyers and the Use Of Technology - Rule 1.6 (c)

- When does a breach of security fall under CRS 6-1-716

- How data is lost or stolen

- How to better protect client confidentiality and sensitive

- Ethics: 1 CLE hour

- Cyber Security General Education: 1 CLE hour

 

Presenter: Nick Krut

MSEE, CNE, CSSA

Cyber Security Scientist

Red Team USA

(A Cyber Security Firm)

CLE Cyber Security for Legal Professionals:

Join us for our Lunch & Learn Workshop February 12th

Presented by the Red Team USA Advisor Group

Click Here to Register February 12 - Limited Seating


Where: Red Team USA Conference rooms

4155 E. Jewell Ave, Denver 80222

When: Feb12, 11:00 – 1:00

Price: $75

Lite Lunch is served along with water, tea & coffee

Click Here to Register February 12 - Limited Seating

Tuesday
Feb052013

Check out our new Videos page

For quite a while I have been using video with clients to make complex tasks easier.   Now that I have quite a few of these video completed I have added a new video page to my site, here is a direct link, 

Collaboration Lab Videos

I have some great videos outlining Monthly Maintenance, so be sure to review them and keep your machine in tip top shape.   There are also some very informative videos form Red Team USA.  Let me know if you have any questions, or suggestions for videos that you would like to see made.

Here is a quick video on Windows Update,

 

Monday
Jan282013

Parental Controls can help

If you are a Windows 7 user one of the great tools that you have access to is Parental Controls. Parental Controls is a tool built into Windows 7 that allows you to restrict program use, monitor time online, and limit the type of content that the child can view.

Now even if you do not believe in limitations, or monitoring, one good point to think about is the program access restriction.

Approximately 2 in 5 of all major virus infections that I work on are a result of a child, spouse, or friend downloading a program that hey should not have, thus resulting in a damaged computer. With the restrictions that Parental Controls imposes this stops this issue cold.  So, even if you are weary of keeping a close watch on your child's activities, you may still want to look at restricting program access, and the ability for users other than the Administrator to install programs.

To find out more, here is a link to Microsoft with more detail on Parental Controls, 

Parental Controls

And if you are not inclined to read, here is short video, 

Using Parental Controls

Friday
Jan252013

Is your cell phone number going public this month?

By now you should know the answer, NO!  Three times in the past two months clients have received a email identical, or similar to this,  

Subject: Cell phone numbers go public this month - Do Not Call number

 PLEASE READ CAREFULLY

REMINDER..... all cell phone numbers are being released to telemarketing companies and you will start to receive sales calls. ....YOU WILL BE CHARGED FOR THESE CALLS.

To prevent this, call the following number from your cell phone: 888-382-1222. It is the National DO NOT CALL list. It will only take a minute of your time.. It blocks your number for five (5) years.

You must call from the cell phone number you want to have blocked. You cannot call from a different phone number. HELP OTHERS BY PASSING THIS ON. It takes about 20 seconds. 

https://www.donotcall.gov/default.aspx

You cell phone number is not going public, here is the statement straight from the FCC, 

The Facts

At present, a wireless 411 directory is only in the idea stage.
Even if a wireless 411 directory is established, most telemarketing calls to wireless phones would still be illegal. For example, it is unlawful for any person to make any call (other than a call made for emergency purposes or made with express prior consent) using any automatic telephone dialing system or any artificial or prerecorded voice message to any telephone number assigned to a paging service, mobile telephone service or any service for which the called party is charged for the call. This prohibition applies regardless of whether the number is listed on the national Do-Not-Call list.

FCC Website Link

It look like the FCC is painfully aware of the scams that have been going on.  If you receive one of these emails, please reply to the sender with this post.   The only way that we can stop these hoaxes is with facts and follow up.   If you are interested in more information on the hoax, check out the Snopes listing,

Celling your Soul