Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Confidential data in computers and information systems, including those used by attorneys and law firms, faces greater security threats today than ever before. They take a variety of forms, ranging from email phishing scams and social engineering attacks to sophisticated technical exploits resulting in long-term intrusions into law firm networks. They also include lost or stolen laptops, tablets, smartphones and USB drives, as well as inside threats — malicious, untrained, inattentive, and even bored personnel. These threats are a particular concern to attorneys because of their ethical duties of competence and confidentiality.
By Ari Kaplan
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
By Nishad Shevde
E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?
By Nina Cunningham
A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.
By Michael Ciaramitaro and Sarah Brown
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they’ll take some information or data with them when they go, either inadvertently or on purpose.