Author Archives: Tom Lambotte

Podcast: The Law Entrepreneur

I recently joined Neil Tyra on his popular podcast The Law Entrepreneur for an honest discussion about the current cybersecurity landscape and threats facing solo and small firm practitioners. It was my fourth visit to the show, which always features … Read More

Tip #26 – Proactive Protection

We’ve addressed the detection of compromised passwords and what to do if your credentials are stolen. Now it’s time to play offense and use proactive measures to avoid future catastrophes. True cybersecurity isn’t about limiting damage but preventing breaches and … Read More

Tip #25 – Stolen Credentials: What Now?

We’ve seen that Dark Web monitoring (included with Security+) is the most effective method for swiftly detecting stolen credentials…but what should you do after discovering that passwords are compromised? First, follow advice from The Hitchhiker’s Guide to the Galaxy and … Read More

Tip #24 – Dude, Where are My Credentials?

Credential theft is the most common and costly of all cybercrimes, yet most don’t understand the threat…and many don’t even know when they’ve been victimized. In the next few articles, we’re going to explore the nature of these attacks, how … Read More

Tip #23 – Dark Web, Darker News

Continuing our series on COVID-driven cybersecurity threats, let’s take a look at the Dark Web: a nefarious presence that seems almost fictional but is the home to some very real threats. You may not know what the Dark Web is, … Read More

Tip #22 – Another Pandemic

Just as vaccines bring COVID under control, the world is on the cusp of another pandemic: ransomware. That’s not hyperbole, but congressional testimony from the director of Cybersecurity and Infrastructure Security. His assessment is backed by the numbers (ransomware attacks … Read More

Tip #20 – Remote Control

The pandemic has challenged our society and structures by pushing medicine, the economy, and psychological tolerance to their limits…but behind the scenes (or behind our screens 🖥), quarantine conditions also threatened cybersecurity. Such quick paradigm shifts accompanied by fear, confusion, … Read More

Tip #19 – Gone Phishing

Of the countless threats to data security, one the most widespread and successful is also one of the simplest: phishing. Phishing is a fraud that exploits human frailty rather than technological weak points and accordingly has thrived in the era … Read More

Tip #18 – Always be Prepared

“A byte of prevention is worth a gig of cure”…is what Ben Franklin might say if he were still alive and publishing today (think Bezos, with slightly more hair).  OK, the imagery is odd, but the adage remains sound – … Read More

ABA Opinion 498: Virtual Practice Reality

COVID has redefined the way law is practiced but hasn’t alleviated any ethical responsibilities…only complicated them. The ABA recently reaffirmed this notion in a Formal Opinion outlining Model Rules for the virtual practice of law (#498) issued March 10, 2021. … Read More


The Security Checklist for Busy Lawyers

The Security Checklist for Busy Lawyers

Check Your Email
For Your Free Checklist