Jonathan is a seasoned Cybersecurity and privacy specialist with a unique background in law. His journey from being a top-rated family law attorney to a cybersecurity expert is a testament to his adaptability and commitment to mastering new fields.
Jonathan began his career in family law, earning recognition as one of the top ten family law attorneys in Illinois under the age of 40 by both the National Academy of Family Law Attorneys and the American Institute of Family Law Attorneys. His peers recognized his exceptional work and named him a Rising Star attorney, a designation limited to less than 2.5% of lawyers under 40 years of age in Illinois. He was also recognized as Leading Lawyers Emerging Lawyer, a designation reserved for less than 2% of Illinois attorneys, and a Super Lawyers Rising Star.
Transitioning from law to cybersecurity, Jonathan has spent years researching all aspects of cybersecurity and privacy. He has become well-versed in the Sophos ecosystem, setting up MDM solutions across a fleet of iOS devices, configuring next-gen enterprise-grade Sophos XG firewalls for home use, and setting up Synology NAS solutions for self-hosting calendar solutions, surveillance systems, photo storage, and video hosting. He is proficient in ZTNA and VPN setup and configuration, end-to-end encrypted solutions, privacy-respecting software and hardware solutions, and compartmentalization strategies. His expertise also extends to multifactor authentication, setup and management of self-hosted IDP solutions, custom DNS filtering and configuration, website setup, configuration, Security and management, and macOS, Windows, iOS setup and configuration to enhance security and privacy.
Enhancing his credentials further, Jonathan recently earned the CompTIA Security+ certification. This globally recognized achievement confirms his advanced skills in cybersecurity and his ability to handle complex security issues. This certification reflects Jonathan’s dedication to maintaining the highest standards of security expertise, ensuring that he is equipped with the latest knowledge and best practices in the rapidly evolving cybersecurity field.
At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.
Recent Content
Scanning Trouble: Illinois' Biometric Information Privacy Act (BIPA) is a critical regulation for safeguarding personal data. Learn about its key provisions, compliance requirements, and real-world im…
Scanning Trouble: Il…
Scanning Trouble: Illinois' Biometric Information Privacy Act (BIPA) is a critical regulation for safeguarding personal data. Learn about its key provisions, compliance requirements, and real-world implications in our comprehensive guide. Stay informed and protected in the biometric era.
Cellebrite Unplugged: Discover the world of Cellebrite, a leading mobile forensics company, and explore its powerful tools used by law enforcement and private investigators to unlock and extract data …
Cellebrite Unplugged…
Cellebrite Unplugged: Discover the world of Cellebrite, a leading mobile forensics company, and explore its powerful tools used by law enforcement and private investigators to unlock and extract data from mobile devices. Learn about the implications for cybersecurity, privacy concerns, and the ethical debates surrounding the use of such advanced Technology. Stay informed on the evolving landscape of mobile forensics and the balance between security and privacy in our increasingly connected world.
Protect your digital life with our comprehensive guide tailored for Baby Boomers. Learn about common cyber threats, secure your online presence with strong passwords and two-factor authentication, and…
Protect your digital…
Protect your digital life with our comprehensive guide tailored for Baby Boomers. Learn about common cyber threats, secure your online presence with strong passwords and two-factor authentication, and discover safe online shopping tips. Stay informed and prepared with practical advice on privacy and cybersecurity. Stay safe and confident online!
Explore the landmark case Murthy v. Missouri, examining its impact on free speech, government influence, and social media moderation. Delve into the Supreme Court’s findings, the dissenting opinion,…
Explore the landmark…
Explore the landmark case Murthy v. Missouri, examining its impact on free speech, government influence, and social media moderation. Delve into the Supreme Court’s findings, the dissenting opinion, and broader implications for public health, democracy, and tech company responsibilities. Stay informed on this critical legal and societal issue.
Join Jonathan Steele on the Lawyers & Mediators International Podcast as he discusses the vital intersection of family law and cybersecurity. Learn essential tips on privacy protection, securing perso…
Join Jonathan Steele…
Join Jonathan Steele on the Lawyers & Mediators International Podcast as he discusses the vital intersection of family law and cybersecurity. Learn essential tips on privacy protection, securing personal devices, and the role of AI in legal practices. Discover the importance of safeguarding personal information in family law cases.
Cyberstalking in domestic abuse cases is a growing threat. Learn how to recognize the signs and implement effective digital safety measures to protect yourself. Discover legal protections and resource…
Cyberstalking in dom…
Cyberstalking in domestic abuse cases is a growing threat. Learn how to recognize the signs and implement effective digital safety measures to protect yourself. Discover legal protections and resources available to victims. Outsmart the digital villain with these essential tips.
Celebrities, athletes, and politicians face unique privacy and security challenges. Discover the legal and practical strategies to protect their identities, including the use of pseudonyms in litigati…
Celebrities, athlete…
Celebrities, athletes, and politicians face unique privacy and security challenges. Discover the legal and practical strategies to protect their identities, including the use of pseudonyms in litigation. Learn how to guard against threats while maintaining a public presence.
Privacy tips are crucial, but some well-meaning advice can lead to legal trouble. Discover common privacy practices that may violate the law and learn how to stay compliant while protecting your infor…
Privacy tips are cru…
Privacy tips are crucial, but some well-meaning advice can lead to legal trouble. Discover common privacy practices that may violate the law and learn how to stay compliant while protecting your information.
Real Estate Cloak and Dagger: Discover the best ways to hold title to real Estate in Illinois while maintaining your privacy. From land trusts to anonymous LLCs, our guide covers the pros and cons of …
Real Estate Cloak an…
Real Estate Cloak and Dagger: Discover the best ways to hold title to real estate in Illinois while maintaining your privacy. From land trusts to anonymous LLCs, our guide covers the pros and cons of each method, helping you protect your identity and assets effectively.
Peek-a-Boo: In today's digital workplace, balancing robust security measures with employee privacy is crucial. As companies mandate security apps on devices, understanding the legal and ethical implic…
Peek-a-Boo: In today…
Peek-a-Boo: In today's digital workplace, balancing robust security measures with employee privacy is crucial. As companies mandate security apps on devices, understanding the legal and ethical implications is essential. This post explores the tension between corporate data protection and personal privacy, offering insights on navigating BYOD policies and legal frameworks.
Kidnapped Connections: Explore the alarming trend of ransomware attackers targeting the children of corporate executives. This post delves into how cybercriminals exploit familial connections to bypas…
Kidnapped Connection…
Kidnapped Connections: Explore the alarming trend of ransomware attackers targeting the children of corporate executives. This post delves into how cybercriminals exploit familial connections to bypass corporate security, highlighting the importance of personal cyber hygiene to safeguard family members from becoming the weakest link in corporate security chains.