User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
start [2019/08/16 16:49] neilstart [2024/01/16 08:32] (current) – [Can I help?] neil
Line 1: Line 1:
-=====What is this? =====+=====🔒 Cybersecurity for lawyers =====
  
-The site is a primer for lawyers on practical cybersecurity+The wiki is a primer for lawyers on practical cybersecurityto improve the security of your law firm. It is run by Internet, tech, and telecoms law firm[[https://decoded.legal|decoded.legal ]] ([[http://dlegal66uj5u2dvcbrev7vv6fjtwnd4moqu7j6jnd42rmbypv3coigyd.onion|decoded.legal on Tor]]).
- +
-It offers practical guidance to improve the security of your law firm. It is run by Neil Brown, on behalf of Internet, tech, and telecoms law firm [[https://decoded.legal|decoded.legal]]. You can follow [[https://twitter.com/neil_neilzone|Neil on Twitter]].+
  
 It is aimed mainly at lawyers in small law firms, without security expertise readily available. It is aimed mainly at lawyers in small law firms, without security expertise readily available.
Line 10: Line 8:
  
 If you want to access this site within Tor, it is available as an [[http://h7isucmawckzflxhipflydxvxpaytk5fozfk5immffg66rhboc74yxyd.onion|.onion service]]. If you want to access this site within Tor, it is available as an [[http://h7isucmawckzflxhipflydxvxpaytk5fozfk5immffg66rhboc74yxyd.onion|.onion service]].
-===== What is this not? ===== 
  
-It is not a substitute for taking your own, expert, advice, and not all guidance will suit your needs or [[threat_modelling|threat model]].+====⚠️ Warnings ==== 
 + 
 +===This is free, and at your own risk === 
 + 
 +This site is not a substitute for taking your own, expert, advice, and not all guidance will suit your needs or [[threat_modelling|threat model]]. If you face particularly severe threats, or attacks aimed specifically at you, get professional support.
  
 It is not a complete guide. There will be threats it doesn’t mention, things some might do differently, and simply differences of view as to the best way to do something. It is not a complete guide. There will be threats it doesn’t mention, things some might do differently, and simply differences of view as to the best way to do something.
 +
 +Basically, if this helps you, great. But whatever you do or don't do, it's all at your own risk.
  
 ===Everyone's skill level varies === ===Everyone's skill level varies ===
Line 23: Line 26:
  
 The security that's appropriate for your needs will depend on your own specific situation. Hopefully, the information here is useful, and helps you head in the right direction. But it's a free online resource, written by people you do not know, so you should not trust it. The security that's appropriate for your needs will depend on your own specific situation. Hopefully, the information here is useful, and helps you head in the right direction. But it's a free online resource, written by people you do not know, so you should not trust it.
 +
 +=== Implementing this will not make you unhackable ===
 +
 +It will, hopefully, make you more secure, but it will not make you unhackable. If you want more assurance than you get from a free website, take professional advice.
 +
  
 ===== Where should I start? ===== ===== Where should I start? =====
Line 45: Line 53:
   * [[audio_and_video|use more secure audio and video services]]   * [[audio_and_video|use more secure audio and video services]]
   * [[virtual_private_networks|secure my Internet traffic when working remotely]]: VPNs and Tor   * [[virtual_private_networks|secure my Internet traffic when working remotely]]: VPNs and Tor
 +  * [[usb_sticks|use USB sticks more securely]]
   * [[securing_your_devices|secure my devices (general)]]   * [[securing_your_devices|secure my devices (general)]]
   * [[securing_your_computer|secure my computer]]   * [[securing_your_computer|secure my computer]]
Line 53: Line 62:
   * [[selecting_computer_phone|buy a new computer or phone]]   * [[selecting_computer_phone|buy a new computer or phone]]
   * [[securing_your_documents|secure my documents]] (including wiping metadata)   * [[securing_your_documents|secure my documents]] (including wiping metadata)
-  * [[cloud|use a cloud service]]+  * [[cloud|use a "cloud" or other third party hosted service]] 
 +  * [[business_continuity_planning|increase my firm's resilience against outages and problems]]
   * [[social_media|use social media in my law firm more securely]]   * [[social_media|use social media in my law firm more securely]]
-  * [[educating_your_staff|educate my staff about cybersecurity]] 
   * [[accreditation|get a cybersecurity accreditation]]   * [[accreditation|get a cybersecurity accreditation]]
  
Line 64: Line 73:
 You can read this site without registration. You can read this site without registration.
  
-If you want to edit or add to this site, you'll need to [[https://cybersecurityforlawyers.org/doku.php?id=start&do=register|register]] an account. You'll be sent an email with a default password, which you will need to change on your first login. You will also set up authentication code for the two-factor authentication. +If you want to edit or add to this site, please [[https://decoded.legal/contact/|email Neil]].
- +
-Although registration is automatic, you won't be able to create or edit anything until Neil has approved your registration. This approach is, hopefully, a trade off between convenience of registration and minimising spam / vandalism.+
  
 ===Can I promote my own product or service === ===Can I promote my own product or service ===
start.1565974147.txt.gz · Last modified: 2021/07/06 09:26 (external edit)