To receive new articles by email, you may sign up here.
Jul 28, 2015
Twelve Tips for Effective Tech Presentations
Excerpt: Let’s face it – whether you are talking about securing your data or describing the functions of legal IT products, the
Read MoreJul 01, 2015
What Will You Do When Your Law Firm Is Breached?
Excerpt: Note that we did NOT title this article, “What Will You Do If Your Law Firm is Breached?” The reason is
Read MoreMay 13, 2015
The Basics of Keeping Your Data Secure
Excerpt: Before you can protect your data, you need to know where it is. That seems pretty obvious, but a
Read MoreMay 04, 2015
Why Do Lawyers Resist Ethical Rules Requiring Competence With Technology?
Excerpt: Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were
Read MoreMay 01, 2015
The Scourge of Law Firms: Ransomware That Encrypts Your Data
Excerpt: Remember the good old days of ransomware? You would get an e-mail saying that you owed the IRS money and
Read MoreMar 04, 2015
Is Cloud Computing Inevitable for Lawyers?
Excerpt: Not a single day goes by when you don’t hear something about cloud computing. It could be some new feature or
Read MoreFeb 16, 2015
It’s Easy to Bypass Smartphone Fingerprint Security
Excerpt: Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint
Read MoreFeb 05, 2015
The Internet of Everything: What It Means for Lawyers
Excerpt: What does the Internet of Everything mean for lawyers? Evidence – lots and lots of new sources of evidence. The continuing
Read MoreFeb 02, 2015
Balancing Technology and Re-establishing Real Relationships
Excerpt: Technology has come to rule us all – to varying degrees – and with dire consequences in some cases. We’ve seen
Read MoreJan 05, 2015
How Lawyers Can Manage Their Technology Well
Excerpt: Can lawyers actually manage their technology (instead of it managing them)? Buying, implementing, replacing and securing technology are huge challenges
Read MoreNov 30, 2014
15 Tips for Safe Shopping Online
Excerpt: Did you know that cyberthieves also have Black Friday and Cyber Monday sales – of stolen credentials, including IDs, passwords, e-mails,
Read MoreNov 20, 2014
Encryption: Its Time Has Come
Excerpt: In the simplest terms, cryptography is the science of secret communication. It involves transmitting and storing data in a form that
Read More