start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
start [2019/08/24 06:36] โ neil | start [2021/07/06 09:26] โ external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | =====Cybersecurity for lawyers ===== | + | =====๐ Cybersecurity for lawyers ===== |
- | The site is a primer for lawyers on practical cybersecurity, | + | The wiki is a primer for lawyers on practical cybersecurity, |
It is aimed mainly at lawyers in small law firms, without security expertise readily available. | It is aimed mainly at lawyers in small law firms, without security expertise readily available. | ||
Line 9: | Line 9: | ||
If you want to access this site within Tor, it is available as an [[http:// | If you want to access this site within Tor, it is available as an [[http:// | ||
- | It is not a substitute for taking your own, expert, advice, and not all guidance will suit your needs or [[threat_modelling|threat model]]. | + | ====โ ๏ธ Warnings ====ย |
+ | ย | ||
+ | ===This is free, and at your own risk ===ย | ||
+ | ย | ||
+ | This site is not a substitute for taking your own, expert, advice, and not all guidance will suit your needs or [[threat_modelling|threat model]]. If you face particularly severe threats, or attacks aimed specifically at you, get professional support. | ||
It is not a complete guide. There will be threats it doesnโt mention, things some might do differently, | It is not a complete guide. There will be threats it doesnโt mention, things some might do differently, | ||
+ | |||
+ | Basically, if this helps you, great. But whatever you do or don't do, it's all at your own risk. | ||
===Everyone' | ===Everyone' | ||
Line 20: | Line 26: | ||
The security that's appropriate for your needs will depend on your own specific situation. Hopefully, the information here is useful, and helps you head in the right direction. But it's a free online resource, written by people you do not know, so you should not trust it. | The security that's appropriate for your needs will depend on your own specific situation. Hopefully, the information here is useful, and helps you head in the right direction. But it's a free online resource, written by people you do not know, so you should not trust it. | ||
+ | |||
+ | === Implementing this will not make you unhackable === | ||
+ | |||
+ | It will, hopefully, make you more secure, but it will not make you unhackable. If you want more assurance than you get from a free website, take professional advice. | ||
+ | |||
===== Where should I start? ===== | ===== Where should I start? ===== | ||
Line 51: | Line 62: | ||
* [[selecting_computer_phone|buy a new computer or phone]] | * [[selecting_computer_phone|buy a new computer or phone]] | ||
* [[securing_your_documents|secure my documents]] (including wiping metadata) | * [[securing_your_documents|secure my documents]] (including wiping metadata) | ||
- | * [[cloud|use a cloud service]] | + | * [[cloud|use a "cloud" or other third party hosted |
* [[business_continuity_planning|increase my firm's resilience against outages and problems]] | * [[business_continuity_planning|increase my firm's resilience against outages and problems]] | ||
* [[social_media|use social media in my law firm more securely]] | * [[social_media|use social media in my law firm more securely]] | ||
- | * [[educating_your_staff|educate my staff about cybersecurity]] | ||
* [[accreditation|get a cybersecurity accreditation]] | * [[accreditation|get a cybersecurity accreditation]] | ||
start.txt ยท Last modified: 2024/01/16 08:32 by neil