Thank you for sharing!

Your article was successfully shared with the contacts you provided.
Security is on everyone’s mind these days, as villains spread various kinds of terror and mischief. Law firms’ tech people worry that their computer systems may be snooped or damaged by hackers. Following are some Web sites that provide guidance for anyone responsible for keeping information systems secure. And, with the idea that it’s always wise to know one’s enemy, the list includes some sites maintained by and for hackers. Internet Tools for Lawyers www.netlawtools.com/security/ Netlawtools Inc. sponsors this site, which features a handy section called “Computer Security for Law Firms.” Under the “Hackers” heading, check the link for “Netlawtools Firewall Page.” That page has some articles about using firewalls to keep hackers away from a network or stand-alone computer. SecuritySearch.net www.securitysearch.net Click on the “Law Link” of the directory to see a collection of links to sites that cover computer security with a legal angle. LawCommerce.com www.lawcommerce.com/technology/art_legal_asps.asp The increasing use of application service providers for law firms’ time-and-billing functions and document management has led to greater security concerns, according to this article by Bob Butler of Time Matters Software. The article features a list of questions a law firm should ask an ASP before submitting confidential information for safekeeping. The Hackers’ Home Page www.hackershomepage.com This site sells products that could be used for hacking into computer networks and phone systems. “All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses,” says a disclaimer. Infosyssec www.infosyssec.com Labeling itself “The Security Portal for Information System Security Professionals,” this site nevertheless has a download section where a “system security professional” can find programs for — as the site phrases it — phreaking, hacking, cracking, flooding and nuking. (“Phreaking” is tricking a phone system; “hacking” is exhibiting expertise with computer systems; “cracking” is breaking into secure systems; “flooding” and “nuking” refer to overwhelming a system with an avalanche of messages or commands.)

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Advance® Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]

Reprints & Licensing
Mentioned in a Law.com story?

License our industry-leading legal content to extend your thought leadership and build your brand.


ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2021 ALM Media Properties, LLC. All Rights Reserved.