• Home
  • /
  • Category Archives: Security

Information Security Threat: Technological Exploits

In my last article, we discussed the first of three security threats in this series, social engineering and the human element. While the social engineer operates as a hybrid between human and technological weakness, pure technical threats exist as well. These threats involve many forms of technology systems: computers, smartphones, printers, security systems, networking equipment, data…

The Growing Calls for Bit Licensing in the Wake of Global Cyberattacks

In recent months, hackers executed a global cyberattack, reportedly attacking over 150 countries, including public and health care systems and individual computers. The attackers demanded payment in bitcoin to unlock computers and return the data. Bitcoin is a non-conventional, decentralized cryptocurrency, based on open-source software invented by Satoshi Nakamoto in 2009. All bitcoin transactions are stored…

Why 2017 May Be the End of Notarization as We Know It

As 2017 swiftly approaches, curious minds want to know: What will be the next “big” technology to disrupt legal processes and documentation? There is undoubtedly an argument for remote eNotarization, or webcam notarization, which enables a signer to have a document notarized remotely using web conferencing technology and digital signatures. Remote eNotarization isn’t the first…

A Look at Security with SaaS Providers

Private cloud offerings including SaaS are growing in our industry largely due to the expense in maintaining hardware and security protocols for client data that law firms have traditionally managed. The expanding data volumes and security requirements complicate those efforts. Data breaches continue to occur, and with companies like AT&T getting stuck with $25 million…

Information Security Threat: The Insider

This is the last of a four-part series on information security threats legal and IT professionals face. In the previous articles, we introduced the issue of information security, and discussed the first two of three common threats: social engineering and the human element and technological exploits. We wrap up this series with the final security threat—the insider. While…

Ethical Pitfalls in Social Media Research, Discovery, and Communications

The New York City and State Bars,30 the Philadelphia Bar31 and the San Diego County Bar32 Associations have provided a number of relevant Discovery of Social Media guidance opinions surrounding issues related to performing research using social media. General Research First, it is perfectly acceptable to search and access social media sites that are freely accessible. The New York Guidance…

123