How to avoid personal damage in the event of a data breach.
Read More »Information Security Threat: The Insider
What you need to know about security threats from inside the firm.
Read More »3 Policies to Protect Confidential Information in the Digital Age
Attorneys who are provided such sensitive client information must take certain steps to help ensure that it is kept confidential.
Read More »Information Security Threat: Technological Exploits
How your business is vulnerable to exploits, and what to do.
Read More »3 Ways to Optimize Data Privacy and Protection in the Digital Age
Privacy breaches occur every day, and firms of all sizes are at risk. It only takes a single breach to jeopardize your brand, your company reputation, customer loyalty, and your bottom line. What changes to traditional information management and security are required to accommodate the always-on, mobile, social attorney? What should firms and corporate law departments do now to achieve …
Read More »Only the Shadow IT Knows
Why is it such a big deal and what can employers do to reduce this practice?
Read More »3 Ways to Optimize Data Privacy and Protection in the Digital Age
Privacy breaches occur every day, and firms of all sizes are at risk. It only takes a single breach to jeopardize your brand, your company reputation, customer loyalty, and your bottom line. What changes to traditional information management and security are required to accommodate the always-on, mobile, social attorney? What should firms and corporate law departments do now to achieve …
Read More »Is Privacy a Thing? Above the Law Answered Yes
What I learned about privacy, and its value, from ATL's Converge Conference.
Read More »People + Access = Biggest Security Threat
Why people, and access, are the biggest security threat.
Read More »Information Security Threat: Social Engineering and the Human Element
A primer on how social engineering works, and how to protect yourself.
Read More »