How your business is vulnerable to exploits, and what to do.
Read More »3 Ways to Optimize Data Privacy and Protection in the Digital Age
Privacy breaches occur every day, and firms of all sizes are at risk. It only takes a single breach to jeopardize your brand, your company reputation, customer loyalty, and your bottom line. What changes to traditional information management and security are required to accommodate the always-on, mobile, social attorney? What should firms and corporate law departments do now to achieve …
Read More »Only the Shadow IT Knows
Why is it such a big deal and what can employers do to reduce this practice?
Read More »3 Ways to Optimize Data Privacy and Protection in the Digital Age
Privacy breaches occur every day, and firms of all sizes are at risk. It only takes a single breach to jeopardize your brand, your company reputation, customer loyalty, and your bottom line. What changes to traditional information management and security are required to accommodate the always-on, mobile, social attorney? What should firms and corporate law departments do now to achieve …
Read More »Navigating Cloud Computing Security in Light of Recent Data Breaches
State ethics guidelines, and other considerations for cloud computing security.
Read More »Encryption is Not a Four Letter Word
What you need to know about encryption, and how to implement it.
Read More »Is Privacy a Thing? Above the Law Answered Yes
What I learned about privacy, and its value, from ATL's Converge Conference.
Read More »5 Things to Consider When Reviewing BYOD Policies
Important things to review in your own, and your clients, BYOD policies.
Read More »5 Ways to Manage Your Data Chaos
Five steps to better prepare your organization for data collection and organization.
Read More »Cyber Attacks are a Risk for Businesses of All Sizes
Why small businesses are at risk of cyber attacks, and what they can do to protect themselves.
Read More »