The Myth of the Secure Cloud
October 02, 2017
"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
The Equifax Breach: Why This One Is Different
October 02, 2017
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Securing Your Information-Rich Employee Benefit Plans
October 02, 2017
Hackers have turned to a new information-rich source: employee benefit plans. This article examines the threat facing benefit plans, explores the applicable legal landscape, and recommends steps to better equip plans to prepare for and manage data breaches.
<i>Legal Tech</i><br> Teaching an Old Dog New Tricks: Business Process Management and Law Firms
October 02, 2017
Though traditionally considered laggards when adopting new technology, law firms have recently started to explore new tricks to fortify performance across their organizations. While this evolution is critical to a firm's survival, it's important that firm administrators understand that substantive improvements are only possible through multi-directional change.
Vendor Contracting for Privacy and Security
September 02, 2017
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Industry Vendors Exploited Via Industry-Wide Cyber Attacks
September 02, 2017
<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.