When transmitting sensitive and confidential client and case details within devices, emails, documents, backups, and flash drives, you need methods and tools to ensure that the information you’re storing and sharing is only read by the intended party. Encryption and multi-factor authentication are valuable tools to ensure information makes it only to the right person, but how you do you actually enable them? In this session, we’ll demonstrate how to:
- Identify the types of info that should only be shared in encrypted formats
- Protect Microsoft files before sending (with technology you probably already have)
- Send and receive encrypted email
- Implement multi-factor authentication on downloaded apps
- Encrypt and store your passwords
- Uncover security blind spots
- Properly “wipe” a device at the end of its life
Jeremy Cherny
Tobin Solutions Inc.