19
May

Is Your Home Internet Secure? Probably not… but it can be.

Posted by on · | Blog

Paul Wagenseil at Tom’s Guide has written an insightful article on home internet security identifying some of the dangers introduced by “commodity” hardware such as routers provided by ISPs and big-box commercial retailers. The problem with a lot of commodity hardware is that manufacturers often take an overly simplistic approach to design and security in […]

Read More
03
Nov

2020 NY Statewide Civil Legal Aid Technology Conference

Posted by on No Tags | Blog · Events

On October 7th and 14th of 2020, New York State’s Permanent Commission on Access to Justice convened its Sixth Annual New York Statewide Civil Legal Aid Technology Conference. The event, co-sponsored by Just-Tech, Simpson Thacher, Cornell Tech, and LegalServer, presented an opportunity for the Managers and I.T. leaders of civil legal services programs to discuss […]

Read More
29
Jun

Access to Justice Webinar: Operating Legal Services Offices in the Time of COVID

Posted by on No Tags | Blog · Events

On June 17th, New York’s Access to Justice Commission hosted a webinar for the managers and I.T. leaders of legal services offices, wherein they discussed how they are dealing with remote work options as they slowly return to a new normal. Panel: Lynn Kelly (City Bar Justice Center), Lillian Moy (Legal Aid Society of Northeastern […]

Read More
01
May

CERT Issues Microsoft Office 365 Security Recommendations

Posted by on No Tags | Blog · Press

With the sudden surge in demand for remote work capabilities, and lot of firms have found themselves under pressure to roll out solutions under shortened time frames, often without necessary best practice planning, execution, and testing. As a result, some systems may go into place that have inherent security flaws that could lead to dire […]

Read More
02
Apr

Sample Emergency Work from Home Policy

Posted by on · · · · · · | Blog · News

This sample Emergency Work From Home (eWFH) policy is presented to Just-Tech clients and other legal services organizations to modify and use as necessary during this time.  Please note that this document contains language and provisions that may or may not apply to your organization, and should be adapted as necessary to fit your organization’s […]

Read More
01
Jul

ICANN Removes Pricing Cap on .Org Domain Names

Posted by on No Tags | Press

Via The Domain Name Wire: The Internet Corporation for Assigned Names and Numbers (ICANN), ignoring consumer and industry feedback, has instituted a rule change that will remove pricing caps on domain name registrations processed through the Public Interest Registry – the organization that manages the traditionally non-profit .org domain. While it is currently  unclear if […]

Read More
19
Jun

New Report Shows Civil Legal Aid is Securing Individual and Family Stability, Improving Lives

Posted by on · | Press

From The Cleveland Plain Dealer: A new report released by The Center for Community Solutions shows how clients that obtained civil legal assistance in housing cases saw marked improvements instability in at least one of five main areas: financial, family, health, housing and education. The report is the result of a collaborative effort between The […]

Read More
20
Jun

Widely used D-Link Modem/Router Under Attack

Posted by on · · · · | News

Ars Technica is running a story on how the Sartori botnet has been actively targeting widely used D-Link DSL Internet modems in a effort to expand its infected base and likely launch new, and more sophisticated attacks against networks and devices. What makes the focus on D-Link notable is its position as one of the […]

Read More
27
Mar

Facebook, Privacy, and What You Need to Know

Posted by on · · · · | Blog

Last week, New Zealand student and technologist Dylan McKay downloaded his entire Facebook archive to see just how much data the company had harvested from. To his surprise, he discovered that not only had Facebook collected the identities of his friends and family from his address book, but that, for a short period between 2016 […]

Read More
06
Feb

In Just 24 hours, 5,000 Android Devices are Conscripted into Mining Botnet

Posted by on · · · · | Blog · News

Via Ars Technica: A new internet worm emerged over the weekend that took less than 24-hours to infect Android devices such a smartphones and TV boxes. Once infected, the devices began mining the Monero brand of crypto-currency, and seeking additional devices to infect: Once infected, Android phones and TV boxes scan networks for other devices […]

Read More