Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
As threat actors continue to evolve, so does the tooling that protects a firm's environment. End point detection and response tooling (EDR) can identify threats and even quarantine a device without intervention from a person. Firewalls can inspect traffic as it enters the firm's domain and block malicious-looking domains and addresses, and multifactor authentication can stop 99.9% of credential-based account attacks.
So why, in the American Bar Association Cybersecurity TechReport, did 29% of respondents answer affirmatively that they'd experienced a security breach in the last year?
It comes back to the people. For many firms, there is an annual requirement to complete security awareness training. This satisfies the cyber insurance carrier, doesn't distract people too often and meets various policy requirements. Some firms do quarterly or monthly training, which keeps the topic more current. However, with the threat landscape changing quickly, training should include more than just a click-through video. There needs to be a focus from leadership on protecting firm assets and a near constant diligence on ensuring users know and understand the risks and how they might be compromised.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.