Articles

To receive new articles by email, you may sign up here.

Jul 28, 2015

Twelve Tips for Effective Tech Presentations

Excerpt: Let’s face it – whether you are talking about securing your data or describing the functions of legal IT products, the

Read More

Jul 01, 2015

What Will You Do When Your Law Firm Is Breached?

Excerpt: Note that we did NOT title this article, “What Will You Do If Your Law Firm is Breached?” The reason is

Read More

May 13, 2015

The Basics of Keeping Your Data Secure

Excerpt: Before you can protect your data, you need to know where it is. That seems pretty obvious, but a

Read More

May 04, 2015

Why Do Lawyers Resist Ethical Rules Requiring Competence With Technology?

Excerpt: Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were

Read More

May 01, 2015

The Scourge of Law Firms: Ransomware That Encrypts Your Data

Excerpt: Remember the good old days of ransomware? You would get an e-mail saying that you owed the IRS money and

Read More

Mar 04, 2015

Is Cloud Computing Inevitable for Lawyers?

Excerpt: Not a single day goes by when you don’t hear something about cloud computing. It could be some new feature or

Read More

Feb 16, 2015

It’s Easy to Bypass Smartphone Fingerprint Security

Excerpt: Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint

Read More

Feb 05, 2015

The Internet of Everything: What It Means for Lawyers

Excerpt: What does the Internet of Everything mean for lawyers? Evidence – lots and lots of new sources of evidence. The continuing

Read More

Feb 02, 2015

Balancing Technology and Re-establishing Real Relationships

Excerpt: Technology has come to rule us all – to varying degrees – and with dire consequences in some cases. We’ve seen

Read More

Jan 05, 2015

How Lawyers Can Manage Their Technology Well

Excerpt: Can lawyers actually manage their technology (instead of it managing them)? Buying, implementing, replacing and securing technology are huge challenges

Read More

Nov 30, 2014

15 Tips for Safe Shopping Online

Excerpt: Did you know that cyberthieves also have Black Friday and Cyber Monday sales – of stolen credentials, including IDs, passwords, e-mails,

Read More

Nov 20, 2014

Encryption: Its Time Has Come

Excerpt: In the simplest terms, cryptography is the science of secret communication. It involves transmitting and storing data in a form that

Read More