SCBAR
  Login
Computer Security

Encryption 

A Safer Way to Store Files Online by Suzanne Kantra
Encryption Made Simple for Lawyers by David G. Ries & John W. Simek
FYI: Playing it Safe With Encryption from the ABA Legal Technology Resource Center

Examples of Encryption Software:
BoxCryptor
PGP (Pretty Good Privacy)
Safebox
Silent Circle
TrueCrypt 
Viivo

Reporting Cyber Crime

USDOJ 
 Cyber Crime Reporting

Wiping or Sanitizing Hard Drives

Software solutions:
CyberCide from CyberScrub
Darik's Boot and Nuke freeware
WipeDrive from WhiteCanyon

Devices:
Drive eRazer - standalone solution for erasing data from a hard drive. No PC necessary.

Spyware, Adware & Viruses

Many computer security experts believe the greatest threat today comes not from viruses sent as email attachments but from spyware added to unsuspecting users' PCs while they browse on the Web. Spyware, as the name suggests, is any technology that aids in gathering information about a person or organization without their knowledge, usually for a malicious purpose. Some distinctions may be made between spyware and adware. Adware is software that displays advertisements on a user's PC while a program is running, but is also capable of tracking a user's personal information and passing it on to third parties, without the user's authorization or knowledge.

A common misconception is that antivirus and firewall software can catch all spyware and adware. Unfortunately, this is not so. Computer users need to be responsible for checking for spyware on their PCs by utilizing software that scans for and removes spyware and adware.

Examples of Free Spyware Removal Tools:
Ad-Aware
Spybot Search and Destroy
Windows Defender

Free Spyware and Adware Detection & Removal Software

Wireless

Convenience or Security: You Can't Have Both When it Comes to Wi-Fi 
Michael Kassner, TechRepublic

Directions for Enabling Security Featurs on Wireless Access Points
PracticePro

Tie Down That Wi-Fi: Security in Public Requires Vigilance
Dennis Kennedy, ABA Journal

Guide to Securing Your Wireless Network
Practically Networked

Wi-Fi Security Risks for Lawyers

Five Ways to Protect Yourself from Wi-Fi Honeypots

Articles

The 5 Best Programs to Protect Your Online Data

10 Worst-Case BYOD Scenarios (And How to Prevent Them) 

Cyber Safety First - Cybercrime, Phising and Social Engineering

Dropbox 102: Security Steps

Good and Bad Passwords How-To An in-depth analysis of good, bad, strong and weak passwords, password cracking techniques and how to reduce password vulnerabilities.

How to Password Protect and Encrypt Microsoft Office 2010 Documents 

Internet Security FAQ - Kaspersky Lab

Layering Security: Two Factor Authentication
by Catherine Reach

Microsoft security article

Mobile Device Security - Don't forget that mobile devices get viruses too.

Symantec Security Response

Check the latest virus threats and computer security advisories

Security Policies Must Address Legal Implications of BYOD (Bring Your Own Device)

Suggestions for Selecting Good Passwords
Article in CERN Computer Newsletter by Lionel Cons

Yahoo Hacked And How To Protect Your Passwords - A good list of tips for protecting your passwords

Software - Firewall and Antivirus

AVG Anti-Virus (free and subscription)
Kaspersky
McAfee Security
Sophos Anti-virus and anti-spam for business
Symantec's Norton security for home & home office, security for small & mid-sized business, and enterprise security products.
Microsoft Security Essentials (free)
Trend Micro
ZoneAlarm - Click here to read a review of ZoneAlarm.