Filter your results
Results 1 - 10 of 19. To narrow results enter search keywords or select filters.
Email communication was never conceived to be the center of our digital lives, hence it wasn't created with security in mind. Today it is an essential part of business communication. Everyday sensitive and confidential information traverses the Internet and other unsecured networks where it may be intercepted or read. Microsoft Office 365 service has been improved by providing multiple methods to encrypt your email, including OME (Office Message Encryption), S/MIME (Secure Multipurpose Internet Mail), IRM (Information Rights Management) and TLS (Transport Layer Security).
This intro level security class is focused specifically on remote working and protecting your client’s confidentiality and your organization's security. Since we have all moved online, hackers and scammers are targeting this new set of remote workers.
In this webinar you'll learn about:
Legal Services Vermont (LSV) and Atlanta Legal Aid Society (ALAS) developed a web accessibility toolkit as part of their TIG-funded projects to enhance their statewide legal help websites. The organizations partnered with a consultant, David Berman Communications, to explore and implement best practices for making their website accessible to people with disabilities.
This toolkit covers:
Introduction
As technology becomes an increasingly critical part of how we work, organizational leaders are actively seeking ways to learn more about the software and best practices that can make their programs more effective and help them meet or exceed the LSC Technology Baselines. But with so many different technologies and solutions available, how do you know what’s useful, what’s affordable, and what’s practical?
Telephones—including text messaging, email, and chat—are a common means for people to seek help, and hotlines are a common way legal services provide that help. The right technologies can make sure your organization provides advice, referrals, and services clients need efficiently and in line with your existing procedures for intake and confidentiality.
Phishing
Pagination
Close
Filter your results
Type
Topics
Tags