A Little Knowledge Goes a Long Way in Protecting Your Online Accounts
Hardly a day goes by without hearing about someone getting an online account “hacked.” Understanding how this type of “hacking” occurs in most situations will go a long way toward helping you protect...
View ArticleEncryption of Mobile Devices: A Security No-Brainer
As attorneys continue to increasingly embrace mobile technology like laptops, smartphones, tablets, external hard drives, and USB (thumb) drives, it is critical for them to understand and address the...
View ArticleIn Brief: The Shellshock or “Bash Bug”
Introducing Shellshock. Also known as the “Bash Bug,” Shellshock exploits a system application found on many computers called Bash that translates “shell” commands into something your device can...
View ArticleCybersecurity 2017: It’s a Scary World Out There
Although lawyers are a tech savvy bunch, ABA TECHREPORT 2016 suggests that they lack security prowess. With all the publicly expressed concern about internet security breaches, the data shows that – as...
View ArticleWatch: Cybersecurity 2017: It’s a Scary World Out There
Although lawyers are a tech savvy bunch, ABA TECHREPORT 2016 suggests that they lack security prowess. With all the publicly expressed concern about internet security breaches, the data shows that – as...
View ArticleChoosing the Right IT Managed Services Provider Is Crucial
Has your firm received a security compliance survey from a potential or current client? The answer several years ago was most likely no. Today, however, it is most likely yes. Information security is...
View ArticleReal-World Zero-Day Threat Detection and Response
The FBI recently published an alert warning that ransomware variants have targeted and compromised vulnerable business servers. The alert states that cyber-attackers target hosts, which potentially...
View ArticleAddressing Your Legal Hiring Needs in Privacy and Data Security
Every week seems to bring news of a massive data breach in the corporate or governmental realm. Its impact is felt on the personal (identity theft), business (loss of profit and goodwill, fines and...
View ArticleWatch: Real-World Zero-Day Threat Detection and Response
The FBI recently published an alert warning that ransomware variants have targeted and compromised vulnerable business servers. The alert states that cyber-attackers target hosts, which potentially...
View ArticleEnhance FINRA’s Cybersecurity Checklist With These Three Security Resources
Every year, the Financial Industry Regulatory Authority (FINRA) releases a letter examining the most pressing issues threatening the financial services industry. Unsurprisingly, cybersecurity remains...
View ArticleCybersecurity for Macs
If you have a Mac, you might think you’re safe from viruses and hacking. In reality, Mac users still fall victim to malware, adware, and other schemes that can easily slip through the cracks if a user...
View ArticleWorking Together for Mutual Defense
In the last decade, cybersecurity has become a major concern for businesses. A threat that was once paid lip service now dominates headlines on a monthly, if not weekly, basis. WannaCry and the latest...
View ArticleCybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a...
In this episode of Digital Detectives, hosts Sharon Nelson and John Simek speak with Denver Edwards about cybersecurity. In their discussion, they address the National Institute of Standards and...
View ArticleThe Great ESI Sales Exodus
The yearning of business development professionals eager to sell offerings beyond the highly commoditized ESI (Electronically Stored Information) play coupled with the rapid consolidation of...
View ArticleLeveraging the SAFETY Act: Building an Effective Security Program
As enterprises face increasingly dynamic risks to their business—including attacks that can entail physical, technological, and especially operational impacts—a common question posed by many...
View ArticleWorking Together for Mutual Defense
In the last decade, cybersecurity has become a major concern for businesses. A threat that was once paid lip service now dominates headlines on a monthly, if not weekly, basis. WannaCry and the latest...
View ArticleThree Common Cybersecurity Mistakes that Could Get You in Trouble
The Panama Papers scandal, the security breach of two prominent New York law firms, and other recent breaches and hacks have moved cybersecurity to the top of most law firms priority lists. However,...
View ArticleTransforming E-Discovery and Cybersecurity Careers With Free Training and...
In 2018, advanced training and education for existing or aspiring cybersecurity and e-discovery professionals will become more critical than ever. With an estimated 2.5 million person talent gap...
View ArticleWatch: How Cybersecurity Risk Affects the Bottom Line
Law firms and attorneys know that the likelihood of a cyber-attack is high and acknowledge that the industry is under siege from cybercriminals. Nothing affects a law firm’s bottom line more than lost...
View ArticleDoD DFARS Cybersecurity Compliance Regulations
Regardless of your legal experience or scope of practice, you’ve probably heard about the Department of Defense’s Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity compliance...
View Article
More Pages to Explore .....