Filter your results
Results 151 - 160 of 348. To narrow results enter search keywords or select filters.
Addition Information
There is a lot of other great writing other there about the topic of social media, here are a few of the links we found more useful and interesting.
A Few Good Tools for Measuring and Monitoring Social Media http://www.idealware.org/print/2592
The Legal Aid Society of Cleveland created this toolkit to support programs that want to use text messaging to gather outcome data following limited scope legal services. Legal service providers, statewide websites and court self-help centers offer self-represented litigants (SRL) help in a variety of ways with a wide range of problems. These limited services include advice at clinics, help filling out forms, and recommendations about enforcing rights and responsibilities.
The legal services community has not been immune to cybersecurity incidents over the past years. Indeed, a significant number of programs have been compromised and significantly impacted by cyber attacks each year. As with the broader non-profit, business, and government communities, the incident rates and stakes are growing within our community.
Purpose
The Problem
Self-Assessment for Organizations
Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.
What Everyone Needs to Know
What Everyone Needs to Know
Multi-Factor Authentication (MFA) adds a second layer of security when logging into your account making it more difficult for cybercriminals to access your account. This means when logging in, you typically need to authenticate in two ways (e.g., password you know and a device or a code you have).
What Everyone Needs to Know
What Everyone Needs to Know
Developing an approach to email security typically involves multiple procedures and techniques for protecting email accounts, content, and communication against unauthorized access, loss, or compromise. Email can be used to infect a device with malware, spread spam, and target users with phishing attacks.
Pagination
Close
Filter your results
Type
Topics
Tags