basic technical troubleshooting when › documents › cov › basictroubleshooting.pdfto hack. the...
TRANSCRIPT
Basic Technical Troubleshooting When Working at Home
YOUR PRESENTER
TOM OrsquoCONNOR JD
bull Director Gulf Coast Legal Tech Center
bull Member of EDRM amp Sedona Conference
bull Faculty at Georgetown Law School EDiscovery
Training Academy
bull Life Fellow of American Bar Foundation
bull Masters Conference Inaugural Scarpitti Award
for Professional Achievement
AGENDA
I PHYSICAL ISSUES
II DATA ISSUES
III FILE STORING ISSUES
IV VIDEO AND AUDIO CALLS
V WHAT TO DO
I INTRO
5
6
Ethical Considerations
bull Duties of Confidentiality amp Competence
bull Must exercise reasonable care and
efforts especially as to
bull technology
bull data security
bull Duty of Ongoing Supervision
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
YOUR PRESENTER
TOM OrsquoCONNOR JD
bull Director Gulf Coast Legal Tech Center
bull Member of EDRM amp Sedona Conference
bull Faculty at Georgetown Law School EDiscovery
Training Academy
bull Life Fellow of American Bar Foundation
bull Masters Conference Inaugural Scarpitti Award
for Professional Achievement
AGENDA
I PHYSICAL ISSUES
II DATA ISSUES
III FILE STORING ISSUES
IV VIDEO AND AUDIO CALLS
V WHAT TO DO
I INTRO
5
6
Ethical Considerations
bull Duties of Confidentiality amp Competence
bull Must exercise reasonable care and
efforts especially as to
bull technology
bull data security
bull Duty of Ongoing Supervision
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
AGENDA
I PHYSICAL ISSUES
II DATA ISSUES
III FILE STORING ISSUES
IV VIDEO AND AUDIO CALLS
V WHAT TO DO
I INTRO
5
6
Ethical Considerations
bull Duties of Confidentiality amp Competence
bull Must exercise reasonable care and
efforts especially as to
bull technology
bull data security
bull Duty of Ongoing Supervision
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
I INTRO
5
6
Ethical Considerations
bull Duties of Confidentiality amp Competence
bull Must exercise reasonable care and
efforts especially as to
bull technology
bull data security
bull Duty of Ongoing Supervision
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
6
Ethical Considerations
bull Duties of Confidentiality amp Competence
bull Must exercise reasonable care and
efforts especially as to
bull technology
bull data security
bull Duty of Ongoing Supervision
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
II PHYSICAL ISSUES
7
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Routers and Modems
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Secure your home router
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Set up firewalls
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Use a VPN
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
WiFi
13
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
II DATA SECURITY
14
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
bull Phony + Fishing = Phishing
bull Phishing still considered biggest data threat
bull FBI Scams and Safety Common
Fraud Schemes (last visited 42620)
bull Not always covered by cyber insurance
bull RansomWare doubling every year
HACKERS
15
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
16
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
17
Law Firms are Targets
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
18
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
How to spot a Spoof Email
19
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Use encrypted communications
haveibeenpwnedcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
III FILE STORAGE ISSUES
21
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
22
File StorageSharing
bull Encrypt data at rest and in transit
bull For very large data sets use a file transfer
protocol site (ftp) INSTEAD OF Dropbox
Evernote Google Docs iCloud or SugarSync
bull Examples
bull Citrix ShareFilereg
bull FileZilla
bull onehub
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
23
USE A DMS
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
ENCRYPTION
24
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
For Only $495 I can read your hard drive
25
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Encrypt Your
Flash Drives if
You Mail Data
26
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Use
Portable
Drive
With A
Lock
27
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
IV WHAT TO DO
28
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Use strong passwords and a password manager
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
The password ldquonormanrdquo
has 320000000 different
combinations and can
take less than a second
to hack
The password
ldquoAq60xMBN$rdquo has
6051064811451701712
0 combinations and
would take 20 years to
hack30
Create Complex Passwords
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Two Factor Authentication
31
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
32
Lock Computer After Inactivity
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Install updates regularly
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Use antivirus software
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Back up your data
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
IV AUDIO and VIDEO CALLS
36
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
VOIP Phones
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
38
VIDEO CALLS
Can You HearSee Me Now
bull Blue Jeans (Verizon) bull GoToMeeting (LogMeIn)
bull Facebook Messenger bull RingCentralreg
bull Facetime (Apple) bull WebEx (Cisco)
bull Fuze bull WhatsApp (Facebook)
bull Google Meet (Hangouts) bull Zoom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
39
Resources
bull Zoomrsquos Biggest Rivals Are Coming for It NYT by Mike Isaac and Sheera Frenkel (42420)
bull Zoomrsquos Security Woes Were No Secret to Business Partners Like
Dropbox NYT by Natasha Singer amp Nicole Perlroth (42020)
bull Video Conferencing and Recording Know the Risks Before You Connect ALM LTN by Gina M Vitiello Chamberlain Hrdlicka(42320)
bull Zoombombing
bull Craig Ball Protect your Meetings From
Zoombombers Ball in your court (32320)
bull 4320 NYT | 4220 CNN | 32520 TO Acorn | 31220 NYT
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom
Tom OrsquoConnor
Director
Gulf Coast Legal
Technology Center
toconnorgulfltcorg
Gayle OrsquoConnor
Owner
GMO Marketing
gaylegmomarketingcom