Peer to Peer Magazine

Winter 2015

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/624538

Contents of this Issue

Navigation

Page 21 of 71

WWW.ILTANET.ORG 23 Want to appear in the next Peer to Peer? Answer the following question: What kinds of apps should law firms and legal departments develop? Send your answer (under 150 words) to kristy@iltanet.org BETTER USER PASSWORDS name . . . . . . . . . . . . . . . . . . . Eric Hoffmaster company . . . Innovative Computing Systems website . . . . . . . .www.innovativecomp.com Often an overlooked or dismissed security hole, user passwords are an easy and frequently used way Internet undesirables breach networks and gain access to sensitive data. Complex passwords (i.e., having at least eight characters and including special characters and numbers) are the best way to ensure a firm isn't easy prey. Change passwords every three to six months to increase your security and reduce risk. Alison, Moneypenny Receptionist Your Moneypenny Receptionist will support your existing team by looking after overflow calls, or by providing a fully outsourced switchboard facility. moneypenny.com 866.202.0005 "Alison looks after calls when our team is busy. We trust her implicitly." Moneypenny client since 2011 T E L E P H O N E A N S W E R I N G O U T S O U R C E D S W I T C H B O A R D ROLE-BASED SECURITY name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rosemary Kupfert company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BQE Software website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .www.bqe.com To secure your clients' data from internal hacking, implement role-based security within critical solutions to limit the number of employees who can view, edit or export client information or documents. Also, configure security settings at the folder level to block access.

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2015