{"id":1033,"date":"2017-09-12T16:42:32","date_gmt":"2017-09-12T20:42:32","guid":{"rendered":"https:\/\/abovethelaw.com\/?p=476904"},"modified":"2017-09-12T16:42:32","modified_gmt":"2017-09-12T20:42:32","slug":"a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools","status":"publish","type":"post","link":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/","title":{"rendered":"A Pictorial Walk-Through Of Microsoft&#8217;s New Cybersecurity Tools"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-476918\" src=\"https:\/\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2017\/09\/cybersecurity-cyber-security-cyberattack-attack-hacker-hacking-300x213.jpg\" alt=\"\" width=\"300\" height=\"213\" \/>I\u2019m going to be discussing cybersecurity a lot in the upcoming months. Just look at what\u2019s happened in the last few months \u2013 HBO got hacked, and Equifax suffered a data breach with 143 million people\u2019s information being exposed. Before that, Dropbox was hacked, Sony, a bunch of celebrities\u2019 nude photos, Ashley Madison, all got hacked. And here I am telling you to put your confidential client records in the cloud, a recommendation I stand by.<\/p>\n<p>I think cybersecurity should be on every person\u2019s mind in 2017, and certainly every lawyer&#8217;s. If you have a bank account that you access online, a credit card, a mortgage payment or car payment, student loans, or use email, you use the cloud. Whether your documents are locked in your office in a filing cabinet, or in a password-protected cloud account, someone other than you can get them. I\u2019ve written several articles on cybersecurity in the past and I am going to be writing several more in the near future. As a legal tech columnist here at Above the Law, I think it\u2019s probably the most important thing I can write about. Don\u2019t get me wrong, I love it when I can help people choose the best desktop scanner, but I love it even more when I can help lawyers prevent having their clients\u2019 confidential information stolen and avoid state bar sanctions and loss of reputation.<\/p>\n<p>One of the problems is that I can tell you things like \u201cuse two-factor authentication\u201d or \u201cuse a VPN,\u201d but if you are not computer literate, it might be hard for you to set up. Or maybe you simply don\u2019t have the time between your law and motion and deposition calendar and so, theoretical threats of potential and unlikely harm at some point in the future do not get much attention.<\/p>\n<p>Office 365 has a relatively new tool that takes only a few seconds to set up to drastically increase your security. The features I\u2019m going to show you took me about 15 minutes to do. Many of you might know that Office 365 offers a lot of features that work great for lawyers. For $20 or less a month, you get five licenses to the desktop versions of Microsoft Office, one terabyte of cloud storage, and email hosting. Few of you probably know about the handful of other tools for collaboration, planning, and organizing your cases and tasks or managing your data. Here\u2019s a rundown of one of those lesser-known tools, called Secure Score.<\/p>\n<p><strong>What Is Secure Score<\/strong><\/p>\n<p>Secure Score is a tool to analyze all of the weak points in your armor. That would be pointless if it didn\u2019t also tell you how to fix those problems. If you have Office 365, <a href=\"https:\/\/securescore.office.com\" target=\"_blank\" rel=\"noopener\">here\u2019s the link<\/a>. Here\u2019s how it works.<\/p>\n<p>On the dashboard, you have a score of x of y. There\u2019s a slider that lets you choose what your target score should be and how tightly you want to lock down your data. Remember that the higher your score, the more it restricts your access to data and could potentially impact workflow. For example, moving the slider all the way to 452, the max score, limits when you would have access to your data from your mobile devices.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-476905\" src=\"https:\/\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2017\/09\/ss-0.png\" alt=\"\" width=\"1436\" height=\"649\" \/><\/p>\n<p>You also get a score of how your data policies compare to others:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-476906\" src=\"https:\/\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2017\/09\/ss-2.png\" alt=\"\" width=\"303\" height=\"573\" \/><\/p>\n<p>If you are not at your target score, it gives you recommendations for how to increase your cybersecurity. For example, above, you\u2019ll see that in this screen shot, Office 365 has identified 17 possible things I could do to increase security. Clicking on any one of those suggestions gives me an overview of what the suggestion is, and also how much it affects my overall security level. If something would contribute only points to my security, it\u2019s less important than a 50-point item.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-476907\" src=\"https:\/\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2017\/09\/ss-3.png\" alt=\"\" width=\"396\" height=\"326\" \/><\/p>\n<p>When you click on Learn more, you get a more detailed explanation, and there\u2019s a button at the bottom to turn on that feature. It\u2019s as simple as that. Office 365 has thousands of settings scattered across dozens of dashboards. Here, you have everything in one place \u2013 all of the explanations and the links to change those settings. All you need to do is click the \u201cLaunch Now\u201d button.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-476908\" src=\"https:\/\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2017\/09\/ss4.png\" alt=\"\" width=\"190\" height=\"595\" \/><\/p>\n<p>The list of recommendations is terrific. It includes links for you to review reports of, for example, times when someone tried numerous times to unsuccessfully log in to your account, or whether a hacker has installed a mail rule that would forward all mail to the hacker.<\/p>\n<p>This is a fantastic tool and I hope you check it out. In about 15 minutes, I raised my score by about 100 points.<\/p>\n<hr \/>\n<p><strong><em>Jeff Bennion is a solo practitioner at the <a href=\"http:\/\/www.jbennionlaw.com\/\" target=\"_blank\" rel=\"noopener\">Law Office of Jeff Bennion<\/a>. He serves as a member of the Board of Directors of San Diego\u2019s plaintiffs\u2019 trial lawyers association,\u00a0<a href=\"https:\/\/www.casd.org\/index.cfm?\" target=\"_blank\" rel=\"noopener\">Consumer Attorneys of San Diego<\/a>. He is also the Chair of the State Bar of California\u2019s\u00a0<a href=\"http:\/\/lpmt.calbar.ca.gov\/LPMT\/ExecutiveCommittee.aspx\" target=\"_blank\" rel=\"noopener\">Law Practice Management and Technology <\/a>section. He is a member of the Advisory Council and instructor at UCSD\u2019s\u00a0<a href=\"http:\/\/extension.ucsd.edu\/programs\/index.cfm?vAction=certDetail&amp;vCertificateID=211&amp;vStudyAreaID=111\" target=\"_blank\" rel=\"noopener\">Litigation Technology Management<\/a>\u00a0program. His opinions are his own. Follow him on Twitter\u00a0<a href=\"https:\/\/twitter.com\/jbennionlaw\">here<\/a>\u00a0or on Facebook\u00a0<a href=\"https:\/\/www.facebook.com\/jbennionlaw\">here<\/a>, or contact him by email at\u00a0<a href=\"mailto:jeff@trial.technology\">jeff@trial.technology<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"summary\">Cybersecurity should be on every person\u2019s mind in 2017, and certainly every lawyer&#8217;s.<\/p>\n","protected":false},"author":629,"featured_media":476918,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11],"tags":[34,153,154,342,343,253,344,345,258,346,347,348,349,350,7],"class_list":["post-1033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-advice","tag-cloud","tag-cloud-computing","tag-cloud-storage","tag-cyber","tag-cyber-attack","tag-cyber-attacks","tag-cyber-security","tag-cybersecurity","tag-jeff-bennion","tag-microsoft","tag-microsoft-office-365","tag-office-365","tag-secure-score","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Pictorial Walk-Through Of Microsoft&#039;s New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Pictorial Walk-Through Of Microsoft&#039;s New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity should be on every person\u2019s mind in 2017, and certainly every lawyer&#039;s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Above The Law&#039;s Legal Tech Non-Event\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-12T20:42:32+00:00\" \/>\n<meta name=\"author\" content=\"Jeff Bennion\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Bennion\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/\",\"url\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/\",\"name\":\"A Pictorial Walk-Through Of Microsoft's New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event\",\"isPartOf\":{\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-09-12T20:42:32+00:00\",\"dateModified\":\"2017-09-12T20:42:32+00:00\",\"author\":{\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/58b3d0ce8beb8abb3bef9c60bba48abd\"},\"breadcrumb\":{\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Pictorial Walk-Through Of Microsoft&#8217;s New Cybersecurity Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/#website\",\"url\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/\",\"name\":\"Above The Law&#039;s Legal Tech Non-Event\",\"description\":\"A Legal Tech Adoption Guide For Perplexed Lawyers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/58b3d0ce8beb8abb3bef9c60bba48abd\",\"name\":\"Jeff Bennion\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf943bd7c578c64927dc97cd4346968aeeb4eb8476988a655632403f1683566b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf943bd7c578c64927dc97cd4346968aeeb4eb8476988a655632403f1683566b?s=96&d=mm&r=g\",\"caption\":\"Jeff Bennion\"},\"description\":\"Jeff Bennion is a solo practitioner at the Law Office of Jeff Bennion. He serves as a member of the Board of Directors of San Diego\u2019s plaintiffs\u2019 trial lawyers association,\u00a0Consumer Attorneys of San Diego. He is also the Education Chair and Executive Committee member of the State Bar of California\u2019s\u00a0Law Practice Management and Technology section. He is a member of the Advisory Council and instructor at UCSD\u2019s\u00a0Litigation Technology Management\u00a0program. His opinions are his own. Follow him on Twitter\u00a0here\u00a0or on Facebook\u00a0here, or contact him by email at\u00a0jeff@trial.technology.\",\"url\":\"https:\/\/abovethelaw.com\/legal-innovation-center\/author\/jeffbennion\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Pictorial Walk-Through Of Microsoft's New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/","og_locale":"en_US","og_type":"article","og_title":"A Pictorial Walk-Through Of Microsoft's New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event","og_description":"Cybersecurity should be on every person\u2019s mind in 2017, and certainly every lawyer's.","og_url":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/","og_site_name":"Above The Law&#039;s Legal Tech Non-Event","article_published_time":"2017-09-12T20:42:32+00:00","author":"Jeff Bennion","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Bennion","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/","url":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/","name":"A Pictorial Walk-Through Of Microsoft's New Cybersecurity Tools - Above The Law&#039;s Legal Tech Non-Event","isPartOf":{"@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage"},"image":{"@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-09-12T20:42:32+00:00","dateModified":"2017-09-12T20:42:32+00:00","author":{"@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/58b3d0ce8beb8abb3bef9c60bba48abd"},"breadcrumb":{"@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/2017\/09\/12\/a-pictorial-walk-through-of-microsofts-new-cybersecurity-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abovethelaw.com\/legal-innovation-center\/"},{"@type":"ListItem","position":2,"name":"A Pictorial Walk-Through Of Microsoft&#8217;s New Cybersecurity Tools"}]},{"@type":"WebSite","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/#website","url":"https:\/\/abovethelaw.com\/legal-innovation-center\/","name":"Above The Law&#039;s Legal Tech Non-Event","description":"A Legal Tech Adoption Guide For Perplexed Lawyers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abovethelaw.com\/legal-innovation-center\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/58b3d0ce8beb8abb3bef9c60bba48abd","name":"Jeff Bennion","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abovethelaw.com\/legal-innovation-center\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf943bd7c578c64927dc97cd4346968aeeb4eb8476988a655632403f1683566b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf943bd7c578c64927dc97cd4346968aeeb4eb8476988a655632403f1683566b?s=96&d=mm&r=g","caption":"Jeff Bennion"},"description":"Jeff Bennion is a solo practitioner at the Law Office of Jeff Bennion. He serves as a member of the Board of Directors of San Diego\u2019s plaintiffs\u2019 trial lawyers association,\u00a0Consumer Attorneys of San Diego. He is also the Education Chair and Executive Committee member of the State Bar of California\u2019s\u00a0Law Practice Management and Technology section. He is a member of the Advisory Council and instructor at UCSD\u2019s\u00a0Litigation Technology Management\u00a0program. His opinions are his own. Follow him on Twitter\u00a0here\u00a0or on Facebook\u00a0here, or contact him by email at\u00a0jeff@trial.technology.","url":"https:\/\/abovethelaw.com\/legal-innovation-center\/author\/jeffbennion\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/posts\/1033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/users\/629"}],"replies":[{"embeddable":true,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/comments?post=1033"}],"version-history":[{"count":0,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/posts\/1033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/media?parent=1033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/categories?post=1033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abovethelaw.com\/legal-innovation-center\/wp-json\/wp\/v2\/tags?post=1033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}