- About Frontline
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Contact
- Contact Thank You
- Digital Forensics
- Document Review
- eDiscovery
- Events
- Financial Managed Services
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Skillbuilder
- System Status
- Webinars
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- About Frontline
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Contact
- Contact Thank You
- Digital Forensics
- Document Review
- eDiscovery
- Events
- Financial Managed Services
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Skillbuilder
- System Status
- Webinars
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Ernesto Negron discusses cybersecurity best practices on Savannah, Ga.’s NBC affiliate – WSAV
January 28, 2021
Ernesto Negron, Director of Security for Intelliteach (now known as Frontline Managed Services) company Hilltop Consultants, provided cybersecurity tips in a segment for the January 28 National Data Privacy Day on WSAV, the NBC affiliate station in Savannah, Ga.
Cyber attacks and attempts at stealing data have been on the rise as remote working has become the norm, but many aren’t taking the proper steps to protect themselves – especially as professionals and consumers rely on such a variety of electronic devices. “We are all so interconnected with all the different devices that we have that privacy is always going to be a concern,” Negron said.
He went on to detail the various vulnerabilities for consumer and professional electronics, especially in a home setting. Beginning with antivirus software, updates should be set to occur automatically and users should regularly confirm the firewall is functioning. For in-home wi-fi routers, Negron noted that users too often fail to update passwords from the default setting, which creates a vulnerability where hackers could access the network and devices.
While cell phones are sources for some of our most personal data, Negron added that people often overlook security when it comes to their mobile devices. In addition to being careful about the applications downloaded to the device, users should review privacy settings of each application – and disable features where necessary.
Of course, secure passwords are central to sound cybersecurity. In addition to using a secure web-based program to store passwords, Negron suggested that users never use the same password for multiple sites, use passwords that are at least 12 characters long and use complex passwords with a blend of cases, numbers and symbols. Users should also take advantage of two-step authentication when available.
While the work-from-home rush exposed significant vulnerabilities, Negron suggests that users have come around and learned security best practices. “It was a learning curve that was forced upon us, so now people are more mindful fo security issues and security concerns, especially with all the security breaches that have been occurring.”
For the full segment, please click here.