Digital Practice Protection: Four Week Intensive Training for Attorneys
Digital Practice Protection: Four Week Intensive Training for Attorneys
Unlike other professions, the practice of law is held to a higher standard. The duty of confidentiality and attorney-client privilege are not ideals to be striven for, but operational requirements. And with governments openly pursuing intellectual property theft, given the scope of modern corporate practice, attorneys and their firms are increasingly targeted.
Today’s attorneys need to work as securely and effortlessly from remote locations as in the office, and the speed to receive, review, and communicate is a challenge unparalleled in the history of the practice of law. The combination of these factors makes the security and privacy of date storage and communication channels is paramount, so TSG has introduced our Digital Practice Protection Training.
Consider the digital services you use:
Banking
Email
Cell phone service
Wi-Fi provider and networks
Websites
Bookkeeping software
Social media accounts and apps
Video conferencing software (Zoom, Google Meet, etc.)
Insurance accounts
Payment processing
Cloud storage and file sharing
Instant messaging accounts (Slack, Teams, etc.)
This is not even a complete list. TSG is here to help you protect your practice and your clients. It all starts with a 30-minute discovery call to help us understand your practice and what services you are using, so the sessions can be tailored for you.
We will then schedule four 1:1, one-hour sessions and a one-hour follow-up Zoom meeting with the instructor to track progress and answer additional questions.
At the end of this course, you will have the tools and knowledge to protect your practice and clients from the threats to every modern law practice.
Understanding and use of password managers
Introduction to and implementation of secure Two-Factor Authentication (2FA) practices
Securing Wi-Fi networks to work remotely
Encryption of devices and file storage (Local and Cloud)
Secure Communication platforms to meet the duty of confidentiality
Social Engineering tactics and mitigation strategies