Find out what the experts in computer security saw at ABA TECHSHOW 2013 – things like attendees with no passcode on their tablets or smartphones and people connecting to insecure networks which monitored their data traffic (through a scary device called a Pineapple). Digital Detectives hosts Sharon D. Nelson, Esq. and John W. Simek, president and vice president of Sensei Enterprises,...
![]() |
Sharon D. Nelson, Esq. is president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. Ms....
John W. Simek is vice president of the digital forensics, managed information technology and cybersecurity firm Sensei Enterprises. He...
Find out what the experts in computer security saw at ABA TECHSHOW 2013 – things like attendees with no passcode on their tablets or smartphones and people connecting to insecure networks which monitored their data traffic (through a scary device called a Pineapple). Digital Detectives hosts Sharon D. Nelson, Esq. and John W. Simek, president and vice president of Sensei Enterprises, Inc., welcome Ben Schorr of Roland Schorr to talk about the best ways to secure your home and office devices.
This episode will help you understand how to connect to the Internet securely when you are out of the office, to create secure passwords for your devices, to keep your security patches up-to-date, to backup and do test restores of your data, and more.
Notify me when there’s a new episode!
Published: | April 26, 2013 |
Podcast: | Digital Detectives |
![]() |
Digital Detectives |
Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.
Clio COO George Psiharis talks through this year’s trends and the sweeping transformative effect COVID-19 has had on the legal profession.
Attorney and cybersecurity expert Ted Kobus addresses the rapid increase in ransomware incidents in 2020 and explains what law firms should do in the...
Doug Austin and Brett Burney give best practice tips for audio and video discovery.
Judy Selby gives a comprehensive overview of the many uses and risks associated with biometric information.
Cybersecurity expert Mike Maschke explains how penetration tests help lawyers protect themselves by identifying weak points in their security systems.
Maura Grossman discusses how TAR is used by medical researchers to support their efforts to understand and treat COVID-19.