Implementing and enforcing an appropriate encryption policy can help reduce risk and avoid exposure of your clients’ confidential information.
Read More »Safeguarding Electronic Communications: Understanding the Evolving Duties
The ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, “Securing Communication of Protected Client Information.”
Read More »Encryption, Cyber Security, and Domestic Surveillance
Securing law firm and client data has been a huge concern for many practitioners in the legal space.
Read More »Why Remote Security Is A Must
The American Bar Association estimates that 20 percent of lawyers now work from home.
Read More »Rest Easy With Encryption
Worldox may have the solution to law professionals struggling to find an easy-to-use solution for document security.
Read More »Mind the Gap: Securing Data Access in Law Firms
In this webinar, we’ll explore the foreseeable risks that could yield unauthorized access to or unintended release of sensitive data, and the different ways in which those risks can be managed. In addition to addressing particular solutions for various devices, we’ll consider thematic approaches amounting to best practices for data security in a mobile world. Gain insight on: Securing …
Read More »Apple Watch, Encryption Tips, LexHacks, and More July Top Reads
Apple Watch, encryption, paperless tips, and other hot topics from July.
Read More »Decrypting Encryption: Gaining Competence on Encryption for Your Practice
Do you encrypt your e-mail when communicating with a client? Do you encrypt client files on your laptop? How can you ensure that the digital files entrusted to you are safe? Understanding the basics of digital encryption may sound like a monumental task, but our experts will break down the technicalities into digestible morsels. Lawyers are responsible for protecting the …
Read More »An Encryption Quick Start Action Plan
8 steps to do now to encrypt your communications.
Read More »Encryption is Not a Four Letter Word
What you need to know about encryption, and how to implement it.
Read More »