How Rouse protects its firm from spear-phising and other malware attacks.
Read More »3 Ways to Optimize Data Privacy and Protection in the Digital Age
Privacy breaches occur every day, and firms of all sizes are at risk. It only takes a single breach to jeopardize your brand, your company reputation, customer loyalty, and your bottom line. What changes to traditional information management and security are required to accommodate the always-on, mobile, social attorney? What should firms and corporate law departments do now to achieve ...
Read More »Encryption is Not a Four Letter Word
What you need to know about encryption, and how to implement it.
Read More »5 Ways to Manage Your Data Chaos
Five steps to better prepare your organization for data collection and organization.
Read More »From Finding to Keeping Facts: An Investigator’s Journey into Legal Tech
How a private investigator, used to dealing with facts, turned into an entrepreneur.
Read More »Confidential Data Leak: 90% Say It’s Happened to Them
inadvertently or not, data leaks happen. Here's what you need to know.
Read More »How to Encrypt Data on Your Mac in a Few Simple Steps
In 10 minutes, learn how to encrypt data on your Mac.
Read More »The Secret to Secure Data in the Cloud? Know What You’re Up Against
Global legislation doesn’t guarantee cross-border data protection. The best thing you can do is to mitigate risk by understanding it.
Read More »In Brief: The Shellshock or “Bash Bug”
Brief run down of the Shellshock, or "Bash Bug," why it matters and what, if anything, you can do right now.
Read More »What SOC 2 Type II Certification Means
Why SOC 2 Type II Certification is important for the apps you use.
Read More »