Features

Social Media Scene: The Easy Path to Success on Social Media — The 1% Rule of the Internet
You may have read a dozen “How To” articles about cracking the algorithms — which sound very mathematical — of any social media platform, but at the end of the day, you're communicating with people.
Features

The Strategy of What You Don't Invest In
Advanced technology isn't free. Outfitting your team with equipment that will move the needle can require an impossibly large capital outlay. The solution may not be, therefore, to purchase all that gear. It may be to lease or finance it.
Features

Elections: The Hidden Security Danger for Governments
The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.
Features

Why Do Cybersecurity Programs Fail?
It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?
Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments
A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.
Features

Phishing for Whales with Spears
<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.
Features

Understanding the Intersection Between GDPR and Cybersecurity
It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.
Features

Legal Tech: Stop, Collaborate and Listen -- Collaboration Tools Are a Brand New Invention
Today's workplaces require tools that enhance employee productivity and provide the flexibility to never miss a critical business opportunity. Organizations in other industries have already experienced the benefits of enterprise collaboration, and now this technology is making its way into the legal sector. The rise of enterprise collaboration is redefining the modern law firm and legal department.
Features

Unprepared for a Cyberattack? The DOJ Wants to Change That
<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.
Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds
The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Availability of Self-Help Evictions to Commercial LandlordsA landlord may re-enter leased commercial premises peaceably, without resorting to court process, in those states where it is permitted, if the right to do so is expressly reserved in a commercial lease, either a) upon the tenant's defaulting on the payment of rent or other lease terms, or b) upon termination of the lease or the tenant's abandoning the premises.Read More ›
- Redefining Attorney-Client Collaboration with Technology That Delivers Greater ValueIf savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.Read More ›
- 'Customary Operations' or A Vacant Building?Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›