Juice Jacking, Say What???

As with any cyber threat, prevention starts with awareness of the risk and, as a road warrior, I see people taking an unnecessary risk far too often. This one involves smart phones.

Here’s the problem. The cable you use to charge your phone is the same one you use to transfer or sync your data. This reality creates an attack vector that someone could take advantage of during the charging process. Read on.

Ditching the Disclaimer

What goes in your professional email? What if your email server occasionally marks something as “read” which in fact has not been read? How do you respond to that? Should you include your email signature every single time or only the first time you respond? What belongs and does not belong in an email signature? What about typos? When does an email become too long and you’d be better off just writing a proper letter? What about graphics in email signatures? Or funny quotations?

And what about that long list of disclaimers many of us lawyers append to every single email signature?

Should You Kill Your Email Inbox to Regain Efficiency? Maybe.

By a show of hands, how many of you look forward to opening your email inbox every morning when you arrive at the office? I see. You sadistic types who raised your hand may put it down now while the other 99% of us discuss the topic at hand – your email inbox. So, should you kill your email inbox? Read this article and its tips and tell me what you think.

Is Texting Clients A Good Idea? Maybe, Maybe Not.

Texting is ubiquitous in our culture, which makes it too easy to embrace that reality by texting day and night regardless of the setting just like everyone else does. The question I’d like to ask is this. Is doing so a good thing, particularly for a lawyer? Remember recent rule changes. Comment 8 to ABA Model Rule 1.1 Competency reminds lawyers that they are to “keep abreast of changes in the law and its practice to include the benefits and risks associated with relevant technology.” If you are communicating with clients via text messaging, have you thought about the ramifications of doing so?

Software for Fighting Email Overload

I started to call this post “Software for Conquering Email Overload.” Then I decided that was a unicorn. There is no such thing as “conquering” our email. Perhaps all we can do is attack it and hope to live to fight another day. To that end, I’ll describe what I do to tame my inbox. I’m providing some links for your convenience, but they are not affiliate links and I do not receive any compensation or benefits for mentioning the products I use.

Need to Protect Sensitive Data? Get it Out of Your Office.

When people think of high-profile hacks, their minds don’t usually drift to the legal world. However, recent security breaches at several large firms, including Cravath, Swaine & Moore LLP and Weil, Gotshal & Manges LLP, have highlighted the vulnerabilities law firms face. In fact, after one such event, Manhattan US Attorney Preet Bharara said the incident “should serve as a wake-up call for law firms around the world: you are and will be targets of cyber hacking, because you have information valuable to would-be criminals.”

When Are You Most Vulnerable to Malpractice? – Guest Lecture with Jared Correia

When are you most vulnerable to a malpractice claim, when are you least? What are the ugly malpractice monsters are rearing their heads going forward? Are you safer as a a newbie or a more seasoned professional? The answers may surprise you. But most importantly, they’ll inform you to help you with your practice going forward. Join Jared and I as we discuss these surprising landmines from our unique perspective.

Pin It on Pinterest