OSB Professional Liability Fund

  • The Fake Law Firm Scam

    July 11, 2019

    You may have heard about so many frauds that you are tired of listening. As a lawyer, you may avoid falling victim to fraud by being hyper-vigilant, by refusing to click on popup windows, or by refraining from opening unexpected attachments that could release malware onto your computer.

    by Sheila Blackford

    View Post »
  • A Few Simple Ways to Increase Data Security

    April 19, 2019

    While the use of technology has changed the practice of law in many positive ways, it can also expose client data to risks posed by increasingly sophisticated cybercriminals with increasingly sophisticated software, scams, and strategies. Fortunately, with a number of free or cost-effective techniques, you can increase data security. Here are just a few.

    by Lee Wachocki

    View Post »
  • All Travel and No Play: Confidentiality Concerns if Working While Traveling

    August 10, 2018

    Summer is a popular time for taking a vacation. Or you may be traveling for work. Even when taking a vacation, many attorneys unfortunately can never truly leave work behind. That usually means traveling with a laptop or other device to be used for completing work. Yet your ethical duty to maintain client confidentiality pursuant to ORPC 1.6 remains the same when working outside the office.

    by Rachel Edwards

    View Post »
  • Data Hoarding: A Potential Risk for Law Firms - Part II

    April 20, 2018

    Image of data center
    In my previous blog post, I discussed the risks and reasons lawyers over-save data. This post is about how lawyers can avoid hoarding data. Don’t start indiscriminately deleting or shredding files to avoid hoarding data. The process must be thoughtful and deliberate.

    by Hong Dao

    View Post »
  • Data Hoarding: A Potential Risk for Law Firms - Part I

    March 15, 2018

    It may come as no surprise that law firms routinely store huge amounts of client and administrative data in both electronic and paper format. Although lawyers are legally and ethically required to retain certain kinds of data, some data is retained unnecessarily. When you store data you aren’t required to keep or don’t need, it’s called data hoarding.

    by Hong Dao

    View Post »
  • Anatomy of a Ransomware Attack: One Firm’s Story

    December 20, 2017

    Picture of ransomware
    Imagine you post an ad on craigslist to hire a legal assistant. Someone immediately responds by email and attaches a zip file. Believing the file contains the applicant’s resume and cover letter, you click on the attachment and download it to your server. Soon afterward, you can’t access any files on your computer. You have just been infected by ransomware.

    by Hong Dao

    View Post »
  • Don't Fall Prey to Spear Phishing

    November 13, 2017

    You may have heard about the popular tax season IRS scam in which the targeted taxpayers were notified by email they were in serious trouble for tax fraud. The IRS scam is an example of spear phishing: the targeted attempt to steal information.

    by Sheila Blackford

    View Post »
  • Understanding Security When Using Cloud Storage

    October 20, 2017

    Data security loc image
    Lawyers increasingly rely on the cloud to store, share, and synchronize their client files. Many use Dropbox and Google Drive for this purpose. However, the use of these common cloud storage services presents some data security concerns.

    by Hong Dao

    View Post »
  • Avoiding Scams: Remain Vigilant

    September 22, 2017

    Law practice tips to avoid scams
    Fraudsters continue to target lawyers, seeking access to client funds and personal information. Lawyers must be vigilant to protect clients against unauthorized access to funds and sensitive information held by the firm on behalf of the client.

    by Jennifer Meisberger

    View Post »
  • Protect Your Practice against Disaster

    September 08, 2017

    Oregon has had a devastating fire season this year, and it’s not over yet. Hundreds of firefighters are currently working hard to contain the Amber Creek Fire in the Columbia River Gorge while also fighting the Chetco Bar Fire, the WhiteWater Fire, and the High Cascade Complex. Let's not forget other natural disasters afflecting different parts of our country. This is a good reminder for lawyers to take steps to protect your practice and livelihood against disasters.

    by Hong Dao

    View Post »
  • Saving Text Messages

    June 16, 2017

    Text messaging with your clients is a practice that requires thoughtful consideration. If you find yourself in a situation in which you want or need to save text messages, you have many options available, but there is no "one size fits all" solution.

    by Rachel Edwards

    View Post »
  • Easy DIY Encryption for Emailing Documents

    June 02, 2017

    Email Encryption for Lawyers
    There are many ways to encrypt email messages sent to clients or other parties. You can use email encryption software like Trustifi, Virtu, or TitanFile. You can also use secure client portals within practice management software to securely exchange documents with clients. Even Outlook Email allows you to send encrypted email messages using a digital ID.

    by Hong Dao

    View Post »
  • Passphrases: An Enhanced Level of Security

    May 19, 2017

    We now live in a digital world. Many of our interactions occur online using computers, smartphones, and other mobile devices. This new reality requires passwords at multiple stages, whether to unlock our computer or smartphone or log in to a practice management software program or website. Here are some suggestions for creating and managing passwords while following proper security measures.

    by Rachel Edwards

    View Post »
  • Safeguard Data with Two-Factor Authentication

    May 05, 2017

    Two-factor authentication is becoming one of the most important methods for safeguarding data. You’ve been using it for years without thinking twice about it. Every time you use your ATM card together with your ATM password, you are using two-factor authentication to access your bank account at the ATM machine.

    by Sheila Blackford

    View Post »
  • Unwanted Data: How to Properly Destroy Data in Hardware

    April 21, 2017

    If you have old computers and other office equipment laying around in your law office or home, there is a good reason they are still with you and not in the dumpster. This article will discuss why you should be concerned about the data in your devices and the proper way to dispose of them.

    by Hong Dao

    View Post »
View All Posts »