logo
  • Home
  • About Ben Stevens
  • Presentations/Publications
  • Contact Ben

Category Archives: Security

Litigants Should Never Accept Smartphones as Gifts

Posted on January 27, 2014 by Ben Stevens Posted in iPhone, Security, Technology Leave a comment
Share

smartphone spywareHave you ever heard the saying “beware of Greeks bearing gifts“? It originated from the Trojan War, when the Greeks left a large “Trojan Horse” at the gates of Troy. The Trojans foolishly brought it inside, thinking that the Greeks had given up (after 10 years of war) and sailed home. Of course, the belly of the horse was filled with armed soldiers, who soon destroyed Troy.

Parties involved in litigation would be wise to learn from the Trojans’ mistake, so as not to meet their same fate. In short, litigants should never accept smartphones as gifts – period – without exception. With today’s ever-changing technology, if someone gives you a smartphone, there is simply no way to ensure that it’s safe and secure, and if you accept it, you do so at great risk.

It is possible for a smartphone to have spyware or other malware preinstalled on it, and you may not have any way of easily detecting that it has been infected.  This malware can do all sorts of harmful, nefarious things, such as transmitting copies of all of your texts/emails, allowing a third party to listen in to all of your phone calls, or even enabling a third party to eavesdrop on you when you aren’t even using your phone.

Of course, such behavior is illegal, and if detected, it should subject the responsible party to criminal prosecution. However, the reality is that these types of spyware programs are difficult to detect and even harder to trace back to the offending party. As inexpensive as smartphones have become, you would be very foolish to accept one as a gift when you are involved in litigation, and it’s much better to be safe then sorry!

Detect and Protect Against Snooping on Your Mac, iPhone, or iPad

Posted on January 13, 2014 by Ben Stevens Posted in How Do I ...?, Security, Technology 1 Comment
Share

CaughtLast week, I published two articles on my family law blog that discussed the issue of snooping. I believe these may also be helpful to my readers here, because we need to remember how important it is for attorneys to take all reasonably prudent steps secure their sensitive data.

These posts not only discussed steps to take to keep your data secure on both your iPhone/iPad and your Mac, but they also listed ways to find out if someone has snooping on you. I hope they are helpful to you and I welcome your feedback.

  • Detect and Protect Against Snooping on Your iPhone or iPad
  • Detect and Protect Against Snooping on Your Mac
Source: South Carolina Family Law Blog

How to Keep Your Teenager Safe Online

Posted on September 9, 2013 by Ben Stevens Posted in Security, Technology Leave a comment
Share

Teenagers today live technology-centric lives. Few things happen that do not involve Facebook, Twitter, or texts in some capacity. Some of this communication takes place with people that parents know, but probably not all of it. What about cyber-bullying, sexual predators, and other online hazards? Parents should consider the following steps to help keep their children safe online:

  1. Have the technology “talk” :: Develop an “acceptable use” policy for your home, perhaps with input from your children. Make sure that your kids clearly understand your rules and expectations for their technology use, and that if they don’t abide by your rules, they lose the ability to use it. Be mindful that tech-savvy teens may find ways around your built-in controls and that no app or setting can keep them safe online. You should check their phones and computers on a regular basis, both in front of them and behind their backs, to ensure that they are following your rules.
  2. Use parental settings wisely :: Macs have Parental Controls preferences that enable you to control your kids’ access to the computer and the Internet and even to specify times that they can and can’t use the computer. While iPads and iPhones have fewer parental controls, you can still control your teen’s ability to install apps, make in-app purchases, and prevent access to age inappropriate movies and music, as explained here.
  3. Friend your children on social networks :: The best way to keep an eye on your children’s activity on social networks is to “friend” and monitor them. They should understand that anything they do or say online is highly visible, lives forever, and can never ever be erased. Take steps to ensure that only their friends can see what they’ve posted on Facebook, and explain that tweets live on in cyberspace forever. Give your kids examples of real people whose reputations have been damaged by something posted online. Basically, if they wouldn’t say it at the dinner table in front of you, they shouldn’t say it online.
  4. Be the holder of the passwords :: When your children understand that they have waived any expectation of privacy, they will more easily accept that you will know all of the passwords for their email, Facebook, and other social media accounts at all times. Being friends with them isn’t enough, as they may attempt to block you from seeing certain posts. You can decide how often to log in and read everything, but they need to know that you can at any time. One idea that’s become popular is to change the wi-fi password in your home every day and only give it to the children when they’ve done their chores, complied with your rules, etc. Another option is to configure your router to set restrictions on a per-device basis, as explained here for an AirPort wireless network.
  5. Don’t let your teens sleep with their phones or computers :: A lot of trouble starts after the sun goes down, so don’t let your children be a part of it. Set up one central location where phones and laptops are charged overnight, and impose punishment for their failure to comply. Also, consider whether it is a good idea to allow your kids to have desktop computers in their bedrooms. If they must, then you should configure access privileges to control nighttime use, or even take the power cord away at night. You will obviously want to make a point of checking their computer regularly so that you know what your child is doing.
  6. Be a good role model :: If you have a rule that prohibits cell phones during certain “family time”, then that rule should apply to parents as well as the children. The central charging station idea referenced above can apply to parents too. Perhaps even consider establishing a daily “device-free time” of just 10 or 15 minutes at the breakfast or dinner table to see if it has a positive impact on your family.
Source: “Six Ways to Keep Teenagers Safe Online” by Abbi Perets, published at Macworld.com.

10 Security Tips to Protect Your Mac

Posted on April 30, 2013 by admin Posted in Security Leave a comment
Share

Although Macs are already very secure, there are steps that you can take to lock down your system. The ten following tips will help ensure that your system is as safe and secure as possible:

  1. Enable Firewall :: Although there may be better firewalls out there, the one built into your Mac is sufficient for most peoples needs. To enable it, open System Preferences, select the Security & Privacy pane, select the firewall tab, and make select the ‘Turn On’ button. (Note: If this is greyed out select the lock at bottom to enable the settings.)
  2. Encrypt With FileVault :: FileVault is a built in app with the roots of you operating system. It encrypts your data on the fly, this means that any data you store is inaccessible if the drive is removed and read from another computer. This is very useful if your Mac is stolen and the hard drive removed in order to retrieve the data. To turn it on, open System Preferences > Security & Privacy tab and select the  ‘Turn On’ button on the FileVault tab.  Be aware of two potential issues: (a) it slows your Mac down when read and writing to your disk and (b) you can’t decrypt your data if you forget your password.
  3. Keep Software Up To Date :: One of the simplest things you can do to keep your Mac secure is to keep its software up to data, especially with security updates and Java updates. The app store will automatically tell you when updates are available. Each software updates fixes bugs and holes in your system, so it needs to have the latest software patches to provide maximum security.
  4. Allow Apps From Trusted Sources :: Apple’s OS X now includes a system application called GateKeeper, which ensures applications come from trusted sources. All applications from the app store are signed to ensure they are safe. Most 3rd party apps which are not sold on the app store are signed by trusted developers. Therefore, you should consider enabling at least the second option to protect yourself from untrusted apps.
  5. Disable Java :: Java is full of security holes, and it is generally a pain to ensure that it doesn’t compromise your system. If you don’t use Java, turn it off.  To turn it off, open up the web browser preferences you use. In Safari go to Preferences > Security, and uncheck the ‘Enable Java’ tab.
  6. Use A Non Admin Account :: One of the less obvious tricks to ensure you have the best security for your Mac is to use a non-admin account. If you create a normal user account for yourself, you will still be able to do all the things you need to, but there is an added layer of security to stop any rouge or damaging applications from running. To generate a new account, open System Preferences, select the Users & Groups pane, select the little plus button at the bottom of the list, add a new ‘Standard’ account. While it might be a pain to swap over all of your files from an admin account to a normal user account, the security benefits are usually worth it.
  7. Disable Automatic Login :: If you travel with your MacBook Pro, you might consider disabling automatic login. This will stop anyone from starting your Mac and easily getting access to your files. Within login options of the Users & Groups preference pane, ensure the automatic login drop down box is set to ‘Off’. This ensures you have to type a password to gain access to your user account.
  8. Require A Password On Wake/Screen Saver :: You ought to also consider setting a password to unlock your computer when it wakes up. This means that no one can access your sleeping Mac without a password. This security setting is enabled from the Security & Privacy pane from within System Preferences. Enable the check box to require a password after sleep or disabling the screen saver. You can also have your Mac log you out automatically if you leave it Mac unattended for too long.
  9. Disable Location Services :: This security tip also falls under the privacy umbrella. Location services tells certain applications where you are based on the GPS chip within your Mac. This means that your Mac can be pin pointed from anywhere on the globe. If you don’t want people knowing where you are you can disable this feature. Open Security & Privacy from System Preferences. Select the Privacy tab. The top option from the sidebar should be an option labelled ‘Location Services’. Uncheck the box that says ‘Enabled Location Services’. If you don’t have a device that has location service enabled, such as an iPhone or iPad, you should be ok. I don’t like it enabled as it can tell too many people where I am.
  10. Secure Empty Trash :: The last security tip is regarding emptying the Trash. When you delete any file only the pointer to the file is remove. This means the bits and bytes that make up the file are still present on your hard disk. If some clever apps you can actually read this data and rebuild the file. For the added security when deleting files use the Finder > Secure Empty Trash, menu bar option. This will overwrite the files with blank data so the original files cannot be recovered.

Source: “12 Security Tips For Your Mac” published at Mac Tricks & Tips.

10 Security Tips to Protect Your Mac

Posted on April 30, 2013 by Ben Stevens Posted in Security Leave a comment
Share

Although Macs are already very secure, there are steps that you can take to lock down your system. The ten following tips will help ensure that your system is as safe and secure as possible:

  1. Enable Firewall :: Although there may be better firewalls out there, the one built into your Mac is sufficient for most peoples needs. To enable it, open System Preferences, select the Security & Privacy pane, select the firewall tab, and make select the ‘Turn On’ button. (Note: If this is greyed out select the lock at bottom to enable the settings.)
  2. Encrypt With FileVault :: FileVault is a built in app with the roots of you operating system. It encrypts your data on the fly, this means that any data you store is inaccessible if the drive is removed and read from another computer. This is very useful if your Mac is stolen and the hard drive removed in order to retrieve the data. To turn it on, open System Preferences > Security & Privacy tab and select the  ‘Turn On’ button on the FileVault tab.  Be aware of two potential issues: (a) it slows your Mac down when read and writing to your disk and (b) you can’t decrypt your data if you forget your password.
  3. Keep Software Up To Date :: One of the simplest things you can do to keep your Mac secure is to keep its software up to data, especially with security updates and Java updates. The app store will automatically tell you when updates are available. Each software updates fixes bugs and holes in your system, so it needs to have the latest software patches to provide maximum security.
  4. Allow Apps From Trusted Sources :: Apple’s OS X now includes a system application called GateKeeper, which ensures applications come from trusted sources. All applications from the app store are signed to ensure they are safe. Most 3rd party apps which are not sold on the app store are signed by trusted developers. Therefore, you should consider enabling at least the second option to protect yourself from untrusted apps.
  5. Disable Java :: Java is full of security holes, and it is generally a pain to ensure that it doesn’t compromise your system. If you don’t use Java, turn it off.  To turn it off, open up the web browser preferences you use. In Safari go to Preferences > Security, and uncheck the ‘Enable Java’ tab.
  6. Use A Non Admin Account :: One of the less obvious tricks to ensure you have the best security for your Mac is to use a non-admin account. If you create a normal user account for yourself, you will still be able to do all the things you need to, but there is an added layer of security to stop any rouge or damaging applications from running. To generate a new account, open System Preferences, select the Users & Groups pane, select the little plus button at the bottom of the list, add a new ‘Standard’ account. While it might be a pain to swap over all of your files from an admin account to a normal user account, the security benefits are usually worth it.
  7. Disable Automatic Login :: If you travel with your MacBook Pro, you might consider disabling automatic login. This will stop anyone from starting your Mac and easily getting access to your files. Within login options of the Users & Groups preference pane, ensure the automatic login drop down box is set to ‘Off’. This ensures you have to type a password to gain access to your user account.
  8. Require A Password On Wake/Screen Saver :: You ought to also consider setting a password to unlock your computer when it wakes up. This means that no one can access your sleeping Mac without a password. This security setting is enabled from the Security & Privacy pane from within System Preferences. Enable the check box to require a password after sleep or disabling the screen saver. You can also have your Mac log you out automatically if you leave it Mac unattended for too long.
  9. Disable Location Services :: This security tip also falls under the privacy umbrella. Location services tells certain applications where you are based on the GPS chip within your Mac. This means that your Mac can be pin pointed from anywhere on the globe. If you don’t want people knowing where you are you can disable this feature. Open Security & Privacy from System Preferences. Select the Privacy tab. The top option from the sidebar should be an option labelled ‘Location Services’. Uncheck the box that says ‘Enabled Location Services’. If you don’t have a device that has location service enabled, such as an iPhone or iPad, you should be ok. I don’t like it enabled as it can tell too many people where I am.
  10. Secure Empty Trash :: The last security tip is regarding emptying the Trash. When you delete any file only the pointer to the file is remove. This means the bits and bytes that make up the file are still present on your hard disk. If some clever apps you can actually read this data and rebuild the file. For the added security when deleting files use the Finder > Secure Empty Trash, menu bar option. This will overwrite the files with blank data so the original files cannot be recovered.

Source: “12 Security Tips For Your Mac” published at Mac Tricks & Tips.

Guest Post :: Whole Disk Encryption & OS X Lion

Posted on July 25, 2011 by Ben Stevens Posted in Guest Posts, How Do I ...?, Mac OS X, Security 5 Comments
Share

With all the discussion about encryption and security, I asked Mac consultant (and MILO member), Matthew Bookspan, to write the following Guest Post, which I hope my readers enjoy and find helpful:

Whole Disk Encryption & OS X Lion

First, this is an exciting feature of OS X Lion for business users. I have opined about this feature before in a previous post. However, let’s state the facts: whole disk encryption ensures business users that their data is more secure than in previous releases of the operating system.

Second, let’s get an understanding of what whole disk encryption means for everyone. Security always sounds great, although it has lots of uncertainty. We’ll use the definition from Wikipedia:

Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term “full disk encryption” (or whole disk encryption) is often used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable operating system partitions.

Setting up whole disk encryption (FileVault 2) in OS X Lion

Originally, we had planned to write a “how-to.” However, Apple has done a better job in articulating the setup steps in this knowledge base article. Further, in the Ars Technica review of OS X Lion, there is another great example of how to enable this feature.

Instead, we are going to focus on how you will use whole disk encryption in your daily tasks.

Before we articulate the usage, there is a key missing item from Apple’s article: time to setup. Yes, it takes time (a lot of it) to enable this feature within OS X Lion.

Let’s articulate the time in detail:

  • Initial setup (not migrating from FileVault v1): about 10-15mins
  • Encryption time: on a brand-new install of OS X Lion, with no additional applications installed, it took just over two hours to enable whole disk encryption on a three year old iMac. This time could decrease or increase based upon your system.

Using FileVault 2: Performance impacts

Once you have Filevault 2 enabled, you will not notice any performance changes. Whether it is real or a matter of perception, your files feel like they open just as fast. Your apps launch without any additional delay. Your backups via Time Machine work the same, etc.

Upon system boot, you will be prompted to login, as you must authenticate with your username and password, even if you previously did not enable this authentication.

Using FileVault 2: Security Benefits

By enabling whole disk encryption, you are adding a new level of security to your Mac. All of your data is now secured using XTS-AES 128 encryption. To translate from technical gobbledygook – this is pretty darn secure.

Utilizing whole disk encryption via FileVault 2 will ensure that if your computer is lost or stolen, your data will not be retrievable. For those with sensitive client data (or business data), utilizing this feature is fundamental to your business security.

Summary

We didn’t spend any time talking about migrating from FileVault v1 to v2 because that is handled in Apple’s Support article mentioned above. Nevertheless, the significant security and performance improvements provided with this whole disk encryption feature is essentially a complete win-win for business users.

If there are any gotchas – there are two:

  1. DO NOT LOSE YOUR SECURITY KEY.
  2. DO NOT FORGET YOUR PASSWORD.

Sorry for the yelling, although we wanted to make sure that you received the message loud and clear. 🙂

Of course, if you want to learn more about FileVault 2/whole disk encryption and security, please don’t hesitate to reach out to us here at Blacktip.

About the Author:  Matthew Bookspan is the Chief Shark at Blacktip IT Services, an Apple Consulting firm based in Orlando, FL. He’s written this post to to help us learn more about OS X Lion Security and has not recieved compensation for it.

(Note:  This article was updated on July 27, 2011, after it’s original publication on July 25, 2011.)

Guest Post :: How to Run Firefox From a USB Drive

Posted on April 12, 2011 by Ben Stevens Posted in Guest Posts, How Do I ...?, Security, Software Leave a comment
Share

Firefox has quickly and rightfully become one of the most used and most loved Internet browsers in existence. Its fast speed, great customizable interface, and strong security measures make it the best option for most computer users when it comes to web browsing. 

From an attorney’s perspective (or anyone within an information-sensitive industry), the benefits of having a USB preloaded with Firefox is clear because the very nature of their business means the information they are browsing is sensitive. When using a public or shared computer such as a library or an internet cafe, one can ensure information is saved and served from their USB and not from the computer ís hard disc, and let us not forget that all of your favorite websites and credentials can be saved within your new portable version of Firefox.

Here is a simple tutorial on how to take Firefox with you anywhere, ready to use on computers that do not have it installed already:

  1. Insert a USB thumb drive into your computer :: The USB thumb drive is the key to this whole process. Without it, there would be no reason for this little tutorial. So before doing anything, take your favorite USB drive, plug it into your computer, and make sure it is properly mounted and ready to have files installed on it.
  2. Download Firefox Portable :: Firefox Portable is a USB Drive app specifically made in order to allow users to run Firefox from any USB Drive. PortableApps.com has taken all of the complexity and frustration of making Firefox mobile, and compiled the process needed into a simple installer program. The proper program can easily be found by typing in "Firefox Portable" into you favorite search engine. Download Firefox portable and you will be ready for the next step.
  3. Install Firefox Portable :: Once Firefox Portable has been downloaded, an installer file should appear where you specified. Run this program to begin installing Firefox portable. During the install, the program will ask you where you want to install the program. Choose the device name or destination code of the USB Drive you want to run Firefox on, then click OK. The program will then take the time to make the necessary changes in your USB drive in order to allow Firefox to run from it.
  4. Using Your USB Drive to Run Firefox :: Once the install is finished, you should be able to run Firefox from any computer that can detect you USB drive properly. To do this, first safely eject the USB drive from the current computer. Next, find a computer you would like to run Firefox on, and plug the USB drive into it, making sure it is mounted properly. Once connected, find your USB Drive’s root directory folder, which should show up in the My Computer area of the device it is connected to. Inside your USB drive, you should see FirefoxPortable. Just run this program and Firefox should start up as normal on any device using your USB Drive.

There you have it. If you followed these easy steps, you should now have the ability to carry Firefox around in your pocket, ready to be called to action anywhere and at any time.

About the Author:  Forte Promo specializes in promotional products for all of your business needs, look to Forte Promo for any new custom flash drives.

Guest Post :: Protect Your Data with Proper Backups

Posted on March 28, 2011 by Ben Stevens Posted in Guest Posts, Office Management, Security 3 Comments
Share

We live in the age of computers and information technology. Almost everything these days is done with the help of a computer: writing letters, sharing pictures and documents, doing homework, filing taxes, and so much more. While using computers can certainly speed up our work, it also makes us more prone to data loss and a host of other new problems.

When all your important information is stored in only one virtual location, a computer crash can be enough to cause serious damage to your work, your finances, maybe even your entire life. Admittedly, the computers today are considerably more reliable than they were a couple of decades ago but the risk of data loss remains. This is precisely the reason you should make a habit out of backing up your computer data, especially the important ones. The good news is that there are several tools you can use to create proper backups: flash disks, DVDs, external hard drives, online storage, and so on. There really is no excuse for not having a backup of your computer data.

Do a Backup of Your Data Regularly

Most people already know that backing up data is extremely important but few realize that it has to be done not only once or twice, but frequently. This is particularly true if you use the computer a lot for work or personal reasons. Ideally, you should do a backup your most important files at the end of each day. This way, you won’t have to worry about losing your photos, articles, music, and other files in case something happens to your computer or your hard drive.

Use Online Backup Services

Consider using online backup services such as iDrive, MozyHome, Carbonite, and CrashPlan. iDrive and MozyHome have a free plan and you can store up to 5GB and 2GB of data, respectively. Carbonite and CrashPlan both offer free trials. For about $55 a year, Carbonite provides unlimited online data storage. For less than $25 a year, CrashPlan provides up to 10GB of online data storage.

Perform a Complete Hard Drive Backup

This is your best protection in case of a computer crash or disk failure. It’s not a good feeling to see all your hard work gone in just a flash. Even if you have to spend money on an extra hard drive and backup software like Acronis, make the purchase because they are worthy investments. They will make your life so much easier. The recommended frequency of doing a complete hard drive backup is once a week. However, if you are very busy (it can take hours to back up an entire hard drive), you can do it monthly. 

Frequently Save Your Work

Save your work as you go along. Have you ever experienced a power failure right in the middle of typing your term paper or an important report for work? This can be very frustrating, especially when you are almost finished when the power goes out, leaving you no choice but to start all over again. Save yourself the trouble and stress by making it a habit to click on the save button or pressing CTRL-S every now and then, perhaps at the end of each paragraph, or whenever you finish a page. Before long, clicking on the save button or pressing CTRL-S will become second nature to you and you won’t even notice that you are doing it. You can also configure your word processor to auto-save your work every minute or two.

About the Author: Rob Boirun maintains the website www.burnworld.com which is a tech site around DVD, Blu-Ray Burning and Video Converting.

Guest Post :: Apple’s “Walled Garden” – Unsustainable Model or Certificate of Quality?

Posted on March 3, 2011 by Ben Stevens Posted in Guest Posts, Mac vs. PC, Security, Technology 4 Comments
Share

I am proud to exclusively present the following Guest Post from Mariana Ashley:

Apple is one of the most recognized brands around the world, and, at least according to a recent Barron’s survey, one of the most respected. Still, not everyone is Apple crazy, as an earlier post about why people love to hate Apple indicated. Apple is always in the news, so I knew something was up when I saw the phrase "Mac-lash" being bandied about on the Internet over the past few days.

Several news outlets used the term "Mac-lash", so let’s look at one such article, published in the UK newspaper The Independent. The thrust of this and other related articles is that the Apple business model may be unsustainable in the long-term. Experts cite a growing discontent from not just developers and publishers, but customers, too. Quoting UK journalism professor Paul Bradshaw, The Independent article notes:

"I’ve been a consumer of Apple products for a while and I’ve very definitely decided not to get an iPad. Apple is increasingly closed and controlling and I think with the iPad they’ve crossed a line to a place where the usability that Apple is so famous for is being undermined by the lack of adaptability. There are so many things that you can’t do with content on an iPad that it makes for quite a poor user experience if you are anything other than a basic user."

Basically, the argument goes that Apple products differentiate themselves by (1) portraying itself as something of luxury item, (2) portraying itself as an "alternative" or "rebellious" product, (3) justifying higher prices by delivering a generally higher quality product , (4) being a closed system in which everything is designed to get you to buy more Apple products.

With the iPad, Number (1) became less relevant, as prices of many of their products fell such that way more people can afford them, in the process losing some of the snob appeal. Same goes with Number (2); now that too many people own Apple gizmos and gadgets, their iconic 1984 commercial seems laughably ironic. Number (3) still holds, and Number (4) is what is angering a growing number of people.

Those who argue that the closed, rigid, some would say almost "old school" business tactics, in which collaboration is insular and products don’t adapt across different platforms, puts Apple at a disadvantage with its competitors like Google. And Number (3), the idea that Apple products are still superior, easy to use, secure, and are generally of a higher quality is what Steve Jobs says makes Apple better.

Jobs noted in a statement last October that open systems aren’t always better, and he attributes his products’ superiority precisely to the way he runs his business, despite it being somewhat reactionary in a climate in which "open" is the hottest buzzword. Detractors say that Apple’s success in terms of delivering hot, in-demand products, is largely attributed to Jobs’ creative genius itself, and that once he goes, Apple will go down with it.

What do you think? Is Apple’s future secured, or will it have to change in some ways to keep up with the competition?

Source:  Mariana Ashley is a freelance writer who particularly enjoys writing about online colleges. She loves receiving reader feedback, which can be directed to mariana.ashley031@gmail.com.

Guest Post :: Is it Time for You to Revisit Your Backup System?

Posted on October 7, 2010 by Ben Stevens Posted in Guest Posts, Office Management, Security, Software 1 Comment
Share

The following Guest Post from Brooks Duncan contains great advice and helpful reminders to everyone about their backup plan(s):

You may have heard the old IT cliche "there are two types of hard drives: those that have failed, and those that will".  

Fortunately, you, being the responsible Mac lawyer that you are, have protected yourself and are doing regular backups. At the very least you have Time Machine running and are backing things up to an external hard drive.

When’s the last time that you took a look at your backup process and made sure that it is still meeting your needs? In the Mac world we love things that "just work", but when it comes to backups, it pays to make sure things "still work".

Is It Tested?

Have you actually gone into your Time Machine backup and made sure that what you think is being backed up actually is? Take a look and see. Do a test restore of some key files to make sure that you can get what you need when you need it.

Go into the Time Machine preferences and make sure you didn’t accidentally exclude something that should be backed up.

If you’re using something else other than Time Machine, it’s the same deal. Test test test to make sure that you can restore. I like what the CEO of Carbonite, an online backup provider, has to say on the subject: "I like to say that Carbonite is not in the backup business ‚ we are in the restore business".

Is It Redundant?

The hard drive that you are copying your files to can fail just as easily as the one you are backing up. Consider having your files backed up to a storage device such as a Drobo or a Netgear ReadyNAS that contains multiple redundant hard drives. Throw in four 1 or 2 Terabyte drives, and if one of them fails, you just take it out and replace it. Your data is still safe.

Is It Offsite?

For your really important files, having them backed up in your office isn’t good enough. All the hard drive crash protection in the world won’t help you if you have a fire, flood, or theft. You need to back them up offsite.

One option is to save them to a hard drive or DVD(s) and take them to another location. This will work, but I am suspect of any backup process that involves doing something manually. It leaves too much open to human error.

A possibly better option is to use online backup. Your critical files will be backed up transparently to a secure online location and won’t take any manual intervention. There are many vendors, but Mozy and Crashplan are two to check out.

Is It The Right Online Plan?

You may already be using online backup, but make sure that your backup provider also supports backing up network storage. You want to be able to back up all your critical files, not just the ones on a local computer.

Is It Tested?

Didn’t I already cover this? Yes, yes I did. However, testing your backups needs to be a regular occurrence, not something that you do just once.

Conclusion

Congratulations on having a backup routine set up. You’re already ahead of 90% of computer users. If you test your backups regularly and take some time to revisit your backup strategy at least once a year, your files will be rock solid.

Source:  Brooks Duncan runs DocumentSnap, a website devoted to going paperless. He helps people unclutter and de-stress by turning their piles of paper into an organized electronic system. He would be pretty happy to be able to write about Mac stuff every day.

Published By

Ben Stevens
  • SC Family Law Blog
  • Subscribe To This Blog
  • Join MILO Group
  • Subscribe To Podcast

Subscribe by Email


Blog Archives

Topics

  • Apps
  • Articles
  • Chrome
  • Did You Know?
  • eDiscovery
  • Guest Posts
  • Hardware
  • How Do I …?
  • iOS
  • iPad
  • iPhone
  • Mac OS X
  • Mac vs. PC
  • Miscellaneous
  • Office Management
  • Office Resources
  • Offline Resources
  • Online Resources
  • Other
  • Other Operating Systems
  • Podcasts
  • Presentations
  • Product Reviews
  • Security
  • Siri
  • Social Media
  • Software
  • Special Offers
  • Switching to Macs
  • Technology
  • This Blog

Recent Updates

  • Learn How to Protect Your Firm from a Security Breach
  • Free Webinar – The 7 Cybersecurity Threats That Could Endanger Your Law Firm In 2021 …And How To Prevent Them
  • Free Webinar: Expert Tips for Mac-Loving Lawyers

Other Resources

  • 9 to 5 Mac | Apple Intelligence
  • a mac lawyer's notebook
  • A Technology Resource for Legal Professionals
  • Acrobat for Legal Professionals
  • Apple Briefs
  • AppleInsider | Apple Insider News and Analysis
  • Criminal Defense Law with an Apple
  • DennisKennedy.com
  • Digital Practice of Law
  • Evan Schaeffer's Legal Underground
  • Futurelawyer
  • Hawk Wings
  • iPhone J.D.
  • Justia Blawg Search
  • LawTech Guru Blog
  • Lawyerist
  • Legal Practice Pro
  • Legal Resource #1
  • Lifehacker, tips and downloads for getting things done
  • Mac Law Students
  • Mac Rumors: Apple Mac Rumors and News You Care About
  • Mac360 – Mac Reviews, Commentary, & Forums
  • Macenstein
  • MacLaw
  • MacLitigator
  • macosxhints.com – OS X tips and tricks!
  • MacSparky
  • My First Mac – Help Buying and Getting Started with Your New Mac
  • PDF for Lawyers
  • Randy Singer's Macintosh Attorney
  • Robert Ambrogi's LawSites
  • Ross Ipsa Loquitur Blog
  • Scripting for Lawyers
  • South Carolina Bar's Macintosh Resources
  • South Carolina Trial Law Blog
  • Switch To A Mac
  • TechnoEsq
  • The Practice
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next

The Mac Lawyer

Ben Stevens | 349 East Main Street, Suite 200, Spartanburg, SC 29302 | P: (864) 598-9172 | F: (864) 598-9264 | info@scfamilylaw.com
Home | About Ben Stevens | Presentations/Publications | Contact Ben
Privacy Policy | Disclaimer
Copyright © 2013, The Mac Lawyer. All Rights Reserved
Cleantalk Pixel