User Behavior Analytics and Your Company's Data
April 02, 2017
While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.
Streaming Pre-'72 Recordings Not Piracy Under Georgia Law
April 02, 2017
The Georgia Supreme Court ruled that media companies streaming music recordings made prior to Feb. 15, 1972, over the Internet without paying royalties or licensing fees aren't violating the state's criminal record piracy law.
<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age
April 02, 2017
While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.
Information Security: The Human Factor
April 02, 2017
Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.
Get Your Attorneys To Write: Eleven Tips
April 02, 2017
One of the toughest aspects of content marketing is generating content on a reliable basis. The bad news is you cannot take attorneys out of the process completely because they are the subject matter experts. The good news is you can use various tactics to motivate and help them to produce good content.
Untangling the Mystery of Cybersecurity Insurance
April 02, 2017
IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.