Author Archives: Tom Lambotte

SSST #32 – The Threat is No Myth

PLEASE STAND BY FOR AN EMERGENCY WARNING FROM THE SSST BROADCAST SYSTEM – THIS IS NOT A TEST! Apple has just issued an urgent software update addressing a critical cyber threat to its entire product line – make sure you … Read More

Prophets and Profits

If you’re looking for an interesting podcast that focuses on the business side of the legal profession, let me recommend Profit with Law, created by Moshe Amsel. I recently recorded my second episode with Moshe, in which we really dug … Read More

SSST 31: Boba’s on Guard

Credential corruption is the most invasive menace among today’s many cybersecurity threats. When criminals have your passwords, they can infiltrate your systems and empty accounts before you ever know you’re in danger. BobaGuard’s 8-layer turnkey solution features several methods to … Read More

SSST #30: In Case of Emergency

Last week started a series assessing cybersecurity challenges and explaining BobaGuard’s turnkey approach to each one. We kicked off with a spotlight on security awareness training that battles breaches caused by hacking and phishing.  Next up: planning ahead with security protocols. What’s … Read More

SSST #29: Easy eight

As the BobaGuard train chugs coast-to-coast, showcasing the first turnkey cybersecurity solution for solo/small/mid-sized law firms, the aspect most attractive to audiences has been our eight interlocking layers of protection. If the best Mexican dips only require seven layers, who … Read More

SSST #28: Even Microsoft Can’t Lock the Gates

The determination that a recent Microsoft Exchange hack was the work of Chinese state actors has put that massive breach back in the headlines, worrying businesses of all sizes. The encouraging news is that small firms using cloud-based email servers … Read More

SSST #27: Bait Shop: Google Docs

Phishing is one of cybersecurity’s most serious threats…and the one most preventable by users. Knowing what to look for can steer you clear of these traps that target your network and identity. Since awareness is your best defense, I’ll occasionally … Read More

Podcast: The Law Entrepreneur

I recently joined Neil Tyra on his popular podcast The Law Entrepreneur for an honest discussion about the current cybersecurity landscape and threats facing solo and small firm practitioners. It was my fourth visit to the show, which always features … Read More

Tip #26 – Proactive Protection

We’ve addressed the detection of compromised passwords and what to do if your credentials are stolen. Now it’s time to play offense and use proactive measures to avoid future catastrophes. True cybersecurity isn’t about limiting damage but preventing breaches and … Read More

Tip #25 – Stolen Credentials: What Now?

We’ve seen that Dark Web monitoring (included with Security+) is the most effective method for swiftly detecting stolen credentials…but what should you do after discovering that passwords are compromised? First, follow advice from The Hitchhiker’s Guide to the Galaxy and … Read More


The Security Checklist for Busy Lawyers

The Security Checklist for Busy Lawyers

Check Your Email
For Your Free Checklist