Blog
2024-08-26 Terrapin is a Clio Certified Gold Partner
Our team at Terrapin is always looking for ways to help our customers grow and become more efficient. It’s why we’ve recently become a Clio Certified Gold Partner.
Related Services
5 Emerging Security Threats in 2024
2024-05-13. As we navigate the ever-evolving landscape of cybersecurity, it’s crucial to stay informed about emerging threats. Here are some key trends and threats to be aware of in 2024:
Related Services
Complimentary Security Training
Managing your business is always challenging but keeping up with cybersecurity threats can be overwhelming. How do you learn about the latest threats? How do you educate your staff about best practices? We have prepared a complimentary security training webinar for our clients to enlist the best resource in computer security defense… your users. This training can also be prepared for a live, interactive presentation to your company, too. Contacts for more information today!
CONTACT USRecent
1.5 Billion Gmail Calendar Users Are the Target of a Crafty New Phishing Scam
Users of Google’s Calendar app are being warned about a scam that takes advantage of the popularity of the free service and its ability to schedule meetings easily. In business, we schedule meetings all the time. One-off calls, recurring weekly updates, and the like.
READ NOW2024-08-26 Terrapin is a Clio Certified Gold Partner
Our team at Terrapin is always looking for ways to help our customers grow and become more efficient. It’s why we’ve recently become a Clio Certified Gold Partner.
READ NOW2024-08 Scammers Are Sophisticated - Protect Yourself
Scammers use many different methods, including technology, impersonation and couriers, attempting to cheat you out of something valuable. While scammers may be increasingly high tech, following these six simple recommendations can help keep your data safe no matter how you are targeted.
READ NOW5 Emerging Security Threats in 2024
2024-05-13. As we navigate the ever-evolving landscape of cybersecurity, it’s crucial to stay informed about emerging threats. Here are some key trends and threats to be aware of in 2024:
READ NOW5 Signs You Computer is Getting Old
With every advertisement of new computers and super-fast processors advertising "revolutionary" computing, you may begin to see your previous-generation computer as antiquated. Is it worth upgrading to the latest and greatest, or so you still have a few years left with the machine you already have on-hand? How do you know if the computer you have is too old?
READ NOWSecure online backup with unlimited storage
Back up computers and laptops in the cloud to protect all of your memories and documents from hardware failure, accidents, or data loss. And, access them anywhere.
READ NOW2024-02 Bank Scams
SCAMMERS go to great lengths to steal money and information. How do they do it? How can you protect yourself and your company?
READ NOWBeware of Pop-ups
2024-03-25. What are pop-ups? Why can they be dangerous? How can you spot them? What devices might they appear on? Read more to find out the answers to these questions and what you can do to stay safe?
READ NOWChoosing The Right Office 365 Plan for Your Team
Microsoft knew what they were doing when they introduced Office 365. It has been a game changer that has taken businesses of all sizes into the cloud – without a significant amount of pain.
READ NOW2023-12 Cybersecurity Best Practices
In January 2022, a new type of malware called Graphite was discovered that leverages OneDrive to deliver an infected file. Simply opening an infected PowerPoint file and moving the mouse triggers the attack.—Infosecurity Magazine. The risk of Graphite malware infections has been largely mitigated by patches released by Microsoft.
READ NOWDefending Yourself Against Covid Related Scams
We’ve shared information more than once in the past about how to avoid phishing and other risks – malware, ransomware, etc. The “Bad Guys” couldn’t be happier about Covid, I assure you. The pandemic and constant news about it has made most of us stressed and anxious, and more vulnerable to attack.
READ NOWDevice Encryption
ENCRYPTION is a security process that causes data to appear scrambled to anyone who does not have the key to unlock the data. If your device is lost or stolen, encryption helps prevent unauthorized access to your data.
READ NOW2023-11 Fileless Cyber Attacks
In a fileless cyber attack, a user is tricket into running malicous code. This code hides ifself from antivirus software by not installing any files. Rather, it uses applications or tools aready present on the device. This type of malicious code could be executed by simply visiting an infected webpage, even if you do not click on anything after it loads. How can you protect yourself?
READ NOWGoing to Trial? Terrapin can help...
Did you know we have someone at Terrapin who can help you prepare a winning trial presentation? You may think of Terrapin as the people you call when your Wi-Fi router is down, or your email isn’t flowing. But we also have someone on our team who has prepared many trial presentations that have led to great trial results.
READ NOWHow Metadata and Redactions Can Cause Law Firms Big Headaches
A typical law firm generates an enormous number of legal documents. The history revealed by those documents—both in the form of user history and uncovered redacted statements—can sometimes lead to a whole lot of unintended drama when mistakes are made. Is your firm doing all it can to ensure you’re minimizing the potential for problems?
READ NOWNew Terrapin Shareholders
Terrapin Technology Group’s founding partners, Nathan Johanson and Tim Raney, are proud to announce that Joseph O’Donnell, Misty Quaintance and Benjamin Wadsworth have become shareholders in the company.
READ NOWProactively Manage eDiscovery Issues by Leveraging Rules of Court
What if there was a way to suss out eDiscovery issues in California state court litigation fairly early in the case, outside of law and motion? What if doing so was simply following the rules?
READ NOWSecurity News: Email Thread Hijacking
Thread hijacking, also known as conversation hijacking, is an effective technique used by cybercriminals. Because a faked email looks like the continuation of an existing email thread, the recipient is far more likely to trust it. How can you protect yourself?
READ NOW2023-10 Security News: Printing
In a recent study, 68% of those interviewed reported costly data losses resulting from insecure printing practices.—Quocirca Print Security Landscape 2022
If this happens, sensitive information could accidentally be revealed to those not authorized to it. How can you protect yourself?
READ NOWStaying Connected While Working Remotely
During the past few weeks Terrapin has worked with our clients to successfully change their place of business from their offices to their homes in response to CV-19. Now that most of us are settled in our new work space, we wanted to share some of the most popular tools we have found to help you stay connected.
READ NOWStaying Safe on Cyber Monday
It’s Cyber Monday! A time for great deals online, but also a time to be particularly alert for scams. Terrapin wants to remind you that fraudulent websites are actively trying to obtain your personal/financial information.
READ NOWLeveraging Technology to Modernize Practice Management
Move your firm to the future by leveraging practice management in the cloud with a service that makes running the firm, organizing matters, easy time management and modern payment methods using Clio and Terrapin (a Clio certified partner)!
READ NOWWhat’s The Deal With The California Consumer Privacy Act?
Have you heard about California’s big new privacy law? The “California Consumer Privacy Act of 2018” (the “Privacy Act”; Cal. Civil Code § 1798.100 et seq.) goes into effect in January of 2020. Significant media coverage surrounding the new law has led many businesses – Terrapin included – to question whether and how the law may apply to them. Terrapin has analyzed the new law and while we do not expect it will affect our clients from an operations or business perspective right now, we feel it’s important to understand how it may impact you personally.
READ NOWWhy Is My Computer So Slow?
2024-05-08. A slow computer can be frustrating, but understanding the reasons behind its sluggish performance can help you address the issue. Here are five key areas to analyze.
READ NOW