• Home
  • /
  • Author: admin

Six Questions to Ask Before Selecting an E-Signature Platform

As technology continues to transform the way we work, more offices are trying to make the move to become truly paperless. E-signatures help keep a document’s workflow in the digital realm and can improve efficiency and security, giving you peace of mind that your company’s—and clients’—information is safe. But unfortunately not all e-signature platforms are…

The Secret to Secure Data in the Cloud? Know What You’re Up Against

The issues of data security and sovereignty have become hot topics in recent years as increasing amounts of sensitive, confidential and personal information is stored in the cloud. With these concerns have come revisions to laws in many countries and jurisdictions to keep up with the changing landscape of data privacy. The trickiest thing to legislate…

Murnane Brandt’s Journey to a Virtual Desktop Infrastructure

I’m the IT manager for Murnane Brandt, a nationally recognized law firm founded in 1940 that’s known for its successful complex litigation practice and strong business department. Our headquarters are in St. Paul, Minnesota, and we have branch offices in Bismarck, North Dakota and Hudson, Wisconsin. With more than 80 attorneys and staff, our goal is to…

Cloud v. On-Premise Security

Pop quiz! Of the following attacks, which of them breached cloud systems and which of them successfully accessed on-premise systems? NSA Snowden leaks JP Morgan Chase breach Home Depot breach Jennifer Lawrence iCloud photos Target breach North Korean SONY attacks Answer: the lone attack in that list to hit a cloud system was the Apple…

When Private is Not Private: Privacy Expectations in the Brave New World

Privacy as we knew it in the past is no longer feasible… How we conventionally think of privacy is dead. —Margo Seltzer, Professor of Computer Science, Harvard University You have zero privacy anyway. Get over it. —Scott McNealy, co-founder, Sun Microsystems We all love our devices: cell phones, tablets, laptops. Our electronic gadgets have changed the…

Six Tips To Reduce Security Risks

Law firms, traditionally unregulated and self-reliant around technology decisions, have recently been surprised: their clients are auditing their security practices, controls and technology. Suddenly, confusion abounds. But why? It shouldn’t. Law firm management should not expect their information technology services and infrastructure to be immune from client scrutiny. There are repetitive areas in which firms struggle to comply…

1234