Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Technology Media and Telecom

Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data

By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Most businesses either shut down temporarily or sent all their employees home to telework by mid-March of this year. By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions of Americans logged on to their home networks and personal desktops, laptops, tablets and mobile phones in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage. Many corporations, and law firms in particular, have already suffered breaches. Many are unaware that a breach has even occurred. American industry was not and is still not adequately prepared for this transition. The responsibility to keep corporate and client data safe is shared by the company and the employee.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next