WWW.ILTANET.ORG 51
GET STARTED
Every firm has unique functions, equipment and systems to consider when shaping its
approach to security. IT security is an active process that requires regular attention and
consideration. Recurring re-evaluation of your firm's security and technology will ensure
these efforts stay aligned with the requirements of supporting your business.
If all this seems overwhelming, remember that this is not an overnight change. You do
not have to do it all at once! Get started, find some traction, and then keep re-examining
your security tools and processes to find ways to improve over time. Start by changing your
password when you finish reading this article!
Instead of simply allowing or not allowing traffic,
newer firewall technology allows for real-time
inspection of traffic and identifies malicious traffic
that previously would have passed through.
habits. For example, users should not
click on a link if they do not know who
sent it, and they should not click on
an "e-fax" if their firm has no internal
email-enabled fax system. Firms must
help their employees be safer and less
risk-prone. Consistent and recurring
user training is the best way to remind
everyone how to help protect the firm.
Security is not an isolated
function within the modern firm;
end users, IT, operations and human
resources must work together to
keep the firm secure. Users must be
diligent and understand they have
an obligation to protect themselves
and the firm's network. The firm must
know the location of important data
on the network and how the data
are protected. A commitment to this
level of knowledge is about more
than technology, it is good business
practice.
SQL CoreRelate Framework.
demonstration.
at www.beclegal.com.
Document Automation and Formatting—
could it be that easy?
BEC Assemble-It provides the industry's most flexible and innovative
document assembly solution for MS Word. BEC LegalBar completes the
automation with styles, numbering, table of contents and templates.