• Home
  • /
  • Author: admin

A Look at Security with SaaS Providers

Private cloud offerings including SaaS are growing in our industry largely due to the expense in maintaining hardware and security protocols for client data that law firms have traditionally managed. The expanding data volumes and security requirements complicate those efforts. Data breaches continue to occur, and with companies like AT&T getting stuck with $25 million…

Information Security Threat: The Insider

This is the last of a four-part series on information security threats legal and IT professionals face. In the previous articles, we introduced the issue of information security, and discussed the first two of three common threats: social engineering and the human element and technological exploits. We wrap up this series with the final security threat—the insider. While…

Four Qualities Modern Corporations Need in Their Legal Teams

There is plenty to be said about how the litigation attorney’s day-to-day has evolved with the advent of big data, increased litigation, and high-tech e-discovery. Undoubtedly, in-house legal teams have undergone the same evolution—so how has this changed what the modern corporation needs from its legal department? In short, a highly effective in-house team requires…

Cybersecurity for Macs

If you have a Mac, you might think you’re safe from viruses and hacking. In reality, Mac users still fall victim to malware, adware, and other schemes that can easily slip through the cracks if a user isn’t careful. In this episode of Digital Detectives, hosts Sharon Nelson and John Simek talk to Tom Lambotte,…

123