- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Ernesto Negron Discusses Cybersecurity Tips on Savannah, Ga.’s NBC Affiliate – WSAV
January 28, 2021
Ernesto Negron, Director of Security for Intelliteach (now known as Frontline Managed Services) company Hilltop Consultants, provided legal cybersecurity tips in a segment for the January 28 National Data Privacy Day on WSAV, the NBC affiliate station in Savannah, Ga.
Cyber attacks and attempts at stealing data have been on the rise as remote working has become the norm, but many aren’t taking the proper steps to protect themselves – especially as professionals and consumers rely on such a variety of electronic devices. “We are all so interconnected with all the different devices that we have that privacy is always going to be a concern,” Negron said.
Quintessential Cybersecurity Tips to Help Fight Common Vulnerabilities
He went on to detail the various vulnerabilities for consumer and professional electronics, especially in a home setting. Beginning with antivirus software, updates should be set to occur automatically and users should regularly confirm the firewall is functioning. For in-home wi-fi routers, Negron noted that users too often fail to update passwords from the default setting, which creates a vulnerability where hackers could access the network and devices.
While cell phones are sources for some of our most personal data, Negron added that people often overlook security when it comes to their mobile devices. In addition to being careful about the applications downloaded to the device, users should review privacy settings of each application – and disable features where necessary.
Of course, secure passwords are central to sound cybersecurity. In addition to using a secure web-based program to store passwords, Negron suggested that users never use the same password for multiple sites, use passwords that are at least 12 characters long and use complex passwords with a blend of cases, numbers and symbols. Users should also take advantage of two-step authentication when available.
While the work-from-home rush exposed significant vulnerabilities, Negron suggests that users have come around and learned security best practices. “It was a learning curve that was forced upon us, so now people are more mindful fo security issues and security concerns, especially with all the security breaches that have been occurring.”
For the full segment, please click here.