The Role of Encryption in Law Firm Data Security
August 01, 2017
Encryption can play a vital role in securing data, but it needs to be considered within the context of a firm's overall IT security strategy. Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs. This article explains how encryption can be used to guard against the reputational, financial and legal damage a breach of sensitive data can cause to law firms.
Standing at the Crossroads of Legal Innovation
August 01, 2017
The law firm business model of the past is under attack. Slowly, private legal is responding with things like developing knowledge management systems, establishing jobs for data analysts who can establish pricing of services and beginning to look at ways to outline workflows and processes. Unfortunately, corporate clients are impatient and are beginning to push harder for improved efficiency and increased speed of service delivery.
Cyber Crime Now Targeting Law Firms
August 01, 2017
<b><i>Is Your Firm Truly Prepared?</b></i><p>Cyber attacks and theft are on the rise around the country, and law firms are becoming prime targets. Similar to healthcare providers, a law firm's data can be the gold standard. Unlike manufacturers, banks and retailers, law firms are unique organizations that result in them being highly vulnerable.
Social Media Scene: Permission to Post
August 01, 2017
<b><I>NASA Doesn't Need a Social Media Policy, and Neither Do You</I></b><p>You don't need a separate policy governing how your firm's staff will represent you on social media. You already have one.
China's New Cybersecurity Law
August 01, 2017
<b><I>The Challenge of Complying</I></b><p>In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Managing Cyber Risks in Medical Practices
August 01, 2017
<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.