Security

ABA/LPM Annual Meeting 2012

The ABA/LPM Annual Meeting is taking place in Chicago from August 2-4, 2012, at The Drake Hotel and there is much to look forward to. LPM is hosting four CLE sessions at the Hyatt Regency Chicago that focus on efficiency in law practice. Advancements in technology change how we practice law, and while lawyers continue to use technology to assist ...

Read More »

Quick Tip: Learn To Spot The Scams

It’s hard to pass a full day without receiving at least one scam attempt in your email inbox. While many of the scams are obviously fake or poorly targeted — for example, an alert for a bank you don’t use — they’ve been growing steadily more sophisticated.  Indeed, there are even a number of scams that have been very carefully ...

Read More »

Navigating Facebook’s Ocean of Personal Data

Technology Review, an excellent journal published by MIT, has an article in its July/August 2012 edition examining Facebook’s growing use of the social sciences to analyze user behavior.  Technology Review editor Tom Simonite writes: Now that the company has gone public, the pressure to develop new sources of profit … is likely to force it to do more with its hoard ...

Read More »

Security Essentials: Stay Up-to-Date

Technology evolves rapidly, and unfortunately security threats evolve right along with it.  To keep your firm’s technology–and your clients’ data–safe, it’s important to keep your software up-to-date and to stay informed about the latest security threats. Thankfully, staying ahead of the security curve doesn’t require a computer science degree.  It can be as simple as bookmarking a few useful blogs ...

Read More »

Quick Tip: Manage Your Social Media Permissions

One of the great attractions of social media and the cloud is the ease with which we can combine tools and expand functionality. With a few clicks, you can link social networking profiles from two different sites, or use your login information from one service to access another. Perhaps you have Twitter feeding automatically to your LinkedIn profile, or you’ve ...

Read More »

How Do You Archive Your Social Media Activity?

We were actually surprised to hear this question when we lectured last week at the Indiana Bar’s Solo and Small Firm Conference. It’s not surprising that large firms feel the need to archive postings, but it was striking that a solo attorney should feel the need. Not only did a member of the audience bring up the possible ethical need ...

Read More »

Comparison of Metadata Ethics Opinions

By now, most lawyers have at least a passing familiarity with the term “metadata,” which refers to the hidden layer of information embedded in most electronic documents.  Metadata is often described as “data about data” because it largely consists of information regarding a document’s origins, including who created it, when it was last opened, and what software was used. But ...

Read More »

Evaluating Cloud-Computing Providers

Moving your practice into “the cloud,” whether that involves a single application or all of your firm’s data, is not for everybody. But if you’re one of the many practitioners who have decided that there’s a compelling business case for employing cloud computing, it’s important that you do the appropriate research—and ask the relevant questions—to make sure you’re using a ...

Read More »

Possible LinkedIn Password Breach: Change Yours Now!

Technology blogs and news sites lit up this morning with news that millions of LinkedIn passwords had reportedly been leaked online.  According to The Verge: A user in a Russian forum is claiming to have hacked LinkedIn to the tune of almost 6.5 million account details. The user uploaded 6,458,020 hashed passwords, but no usernames. It’s not clear if they ...

Read More »

Adobe Acrobat X Pro: Redaction Tutorial

In the past, redaction could be a tedious (and expensive) nightmare.  Lengthy copies of documents would have to be printer, carefully examined word-for-word, and redacted manually with a thick black marker.  With Adobe Acrobat X Pro, you can quickly redact documents using a variety of built-in tools.  In this tutorial, we address: Using search-and-redact to easily locate sensitive information throughout ...

Read More »