Whitepapers
- Avoid These Three Common Security Blind Spots
- Causes Of Business Disasters
- Tools And Protocols To Protect Client Data
- Why The Cloud Is Important For Disaster Avoidance
- Wireless Encryption
- Email Encryption and Secure Client Communication
- Encryption Options for Online Sync Programs Like Dropbox, OneDrive, Box and Google Drive
- Password Managers
- Two Factor Authentication
- Antivirus-Antimalware Software
- Back It Up!
- Follow A 3-2-1 Backup Strategy
- Know Your Options – Lost Data Can Be Recovered (For a Price)
- 6 Step Ransomware Defense Plan for Law Firms
- Surge Suppressor & Uninterruptible Power Supply ("UPS")
- Cybersecurity Policy Handbook
- Practical Guide for Cybersecurity for the Small Firm
- The Oops of AI
Checklists & Forms
- The Definitive Guide to Disaster Planning
- Earthquake Preparedness Checklist
- Plan and Prepare Your Business for Wildfires
- Cybersecurity Checklist
- Tornado Preparedness Checklist
- Evacuation Checklist
- Crisis Communications Planning Checklist
- Flood Preparedness Checklist
- Plan and Prepare for Hurricanes
- 10 Steps to Business Continuity
- Winter Weather Preparedness Checklist
Videos
- Tech Tip: Securing Online Document Storage for Attorneys
- Tech Tip: Virtual Private Networks for Attorneys
- Quick Takes for Your Practice: The Ethical Pitfalls of Online Reputation Management
- Quick Takes for Your Practice: Emergency Planning for Your Practice
- Quick Takes for Your Practice: Changes to the MCLE Rules
Products and Services
Comparison Charts
- Password Managers Feature Comparison Chart
- VPN Services Feature Comparison Chart
- Encryption Services Feature Comparison Chart
- Google Workspace vs Microsoft 365 Comparison Chart
- PDF Programs for Mac Feature Comparison Chart
Malpractice Insurance
Ethics
ISBA Advisory Opinions on Professional Conduct
Free On-Demand CLE
Eligible ISBA members receive 15 hours of Free On-Demand CLE as a member benefit. Non-members may purchase these programs.
Articles
-
October 2025Document Management Tipping Points
-
April 2025Cleaning Up Your Digital Footprint
-
March 2025How Cyber-Secure Are You?
-
August 2019Not Just a Requirement
-
April 2019Houston, We Have a Problem … Top 10 Signs You Have a Virus or Malware
-
March 2019It’s Okay, I’m a Lawyer!: How the Expansion of the Attorney-Litigation Privilege is Changing the Game
-
January 2019Don’t Think Disaster Can’t or Won’t Happen
-
December 2018Is Dropbox Safe?
-
October 2018Is Your Email an Open Secret?
-
July 2018How to navigate conflicts between demands for confidentiality of discovery and settlement and indemnification—your duty to your client and the law
- June 2018
-
February 2018How to Be Sure You’re Cybersecure
- August 2017
-
May 2017The big two threats you need to be aware of today
-
December 2016Keeping Your Cell Phone Secure
-
November 2016Don’t Let a Disruption Be a Practice Disaster
- December 2015
- October 2015
-
October 2015Securing Your Electronic Client Communications
-
May 2015Client Confidentiality in the Digital Age
- January 2015
-
April 2014A Lawyer’s Duty to Understand Technology: The Forest and the Trees
-
November 2013The Ethics of Lost Laptops, Cloud Computing
-
April 2018The high price of free email