We use cookies or similar technologies to improve user experience, analyze website traffic, enable and maintain log-in and personalization settings, connections with selected partners and for marketing purposes (managing advertising space and recommend products of interest to you). You can block or adjust saving cookies at any time, by changing the settings of your web browser. By continuing to use this website without disabling cookies in your web browser you ‘ACCEPT’ saving cookies. Learn more in our Privacy Policy.

Hardware & Software Encryption Strategies for Protecting Your Law Firm 2022

Product ID: CA3364R6
Presented By: State Bar of Wisconsin PINNACLE

Deter data disasters

An associate in your firm misplaces their smartphone. Your partner’s laptop is stolen at a conference. Or a group of nefarious hackers in a foreign country gains access to your firm’s computer systems. No matter how they happen, threats to sensitive client data are pervasive, so what can you do to prevent them?

That’s where data encryption comes in. Encryption uses algorithms to scramble data, keeping information from winding up in the wrong hands. At Hardware and Software Encryption Strategies for Protecting Your Law Firm, join the State Bar of Wisconsin’s Law Practice Assistance Manager Christopher Shattuck to learn practical steps you can take to protect the hardware and software powering your firm’s operations. He’ll walk you through encryption protocols for:

  • Computer hardware
  • Mobile devices
  • Email and text messages
  • Social media
  • Other web-based communications
Read More ↓

Interested in sponsoring this program? Find out more.

Select a Format

OnDemand seminar
Course manual (PDF)
Course manual (PDF) and Audio (MP3)
MP3

Pricing

Member $89.00

Non-Member $139.00

Credits

1 LPM

Date and Time

Friday, October 28, 202212:00 PM - 1:00 PM CT

Add to Calendar 10/28/2022 12:00:00 PM 10/28/2022 1:00:00 PM America/Chicago Hardware & Software Encryption Strategies for Protecting Your Law Firm 2022

Deter data disasters

An associate in your firm misplaces their smartphone. Your partner’s laptop is stolen at a conference. Or a group of nefarious hackers in a foreign country gains access to your firm’s computer systems. No matter how they happen, threats to sensitive client data are pervasive, so what can you do to prevent them?

That’s where data encryption comes in. Encryption uses algorithms to scramble data, keeping information from winding up in the wrong hands. At Hardware and Software Encryption Strategies for Protecting Your Law Firm, join the State Bar of Wisconsin’s Law Practice Assistance Manager Christopher Shattuck to learn practical steps you can take to protect the hardware and software powering your firm’s operations. He’ll walk you through encryption protocols for:

  • Computer hardware
  • Mobile devices
  • Email and text messages
  • Social media
  • Other web-based communications
aagOTNdBczOPpqCrTmAF60877

No longer available, please choose from options above.

Maximum quantity must be less than or equal to 1.

Deter data disasters

An associate in your firm misplaces their smartphone. Your partner’s laptop is stolen at a conference. Or a group of nefarious hackers in a foreign country gains access to your firm’s computer systems. No matter how they happen, threats to sensitive client data are pervasive, so what can you do to prevent them?

That’s where data encryption comes in. Encryption uses algorithms to scramble data, keeping information from winding up in the wrong hands. At Hardware and Software Encryption Strategies for Protecting Your Law Firm, join the State Bar of Wisconsin’s Law Practice Assistance Manager Christopher Shattuck to learn practical steps you can take to protect the hardware and software powering your firm’s operations. He’ll walk you through encryption protocols for:

  • Computer hardware
  • Mobile devices
  • Email and text messages
  • Social media
  • Other web-based communications
Read More ↓

Christopher C. Shattuck has been the Law Practice Assistant Manager for the State Bar of Wisconsin since 2017. Mr. Shattuck previously managed a department and litigated cases at a creditor’s rights firm in Milwaukee. In addition to providing confidential law practice consultations, he frequently writes and speaks on law practice management topics. He received his undergraduate and master of business administration degrees from the University of Wisconsin – Oshkosh and his law degree from the University of La Verne College of Law in southern Californi

  • Protect your firm’s hardware and software from common attacks
  • Understand how to encrypt and protect emails, texts, and more
  • Ensure your clients’ sensitive information is protected from data breaches
  • All lawyers
  • Law office support staff
  • Law office IT staff
  • Lawyers responsible for safeguarding highly sensitive client data
0 Customer Reviews
5 star
0%
4 star
0%
3 star
0%
2 star
0%
1 star
0%

Customer Reviews

Share your thoughts with other customers by being the first to review this product and or seminar.