Articles

To receive new articles by email, you may sign up here.

May 13, 2015

The Basics of Keeping Your Data Secure

Excerpt: Before you can protect your data, you need to know where it is. That seems pretty obvious, but a

Read More

May 04, 2015

Why Do Lawyers Resist Ethical Rules Requiring Competence With Technology?

Excerpt: Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were

Read More

May 01, 2015

The Scourge of Law Firms: Ransomware That Encrypts Your Data

Excerpt: Remember the good old days of ransomware? You would get an e-mail saying that you owed the IRS money and

Read More

Mar 04, 2015

Is Cloud Computing Inevitable for Lawyers?

Excerpt: Not a single day goes by when you don’t hear something about cloud computing. It could be some new feature or

Read More

Feb 16, 2015

It’s Easy to Bypass Smartphone Fingerprint Security

Excerpt: Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint

Read More

Feb 05, 2015

The Internet of Everything: What It Means for Lawyers

Excerpt: What does the Internet of Everything mean for lawyers? Evidence – lots and lots of new sources of evidence. The continuing

Read More

Feb 02, 2015

Balancing Technology and Re-establishing Real Relationships

Excerpt: Technology has come to rule us all – to varying degrees – and with dire consequences in some cases. We’ve seen

Read More

Jan 05, 2015

How Lawyers Can Manage Their Technology Well

Excerpt: Can lawyers actually manage their technology (instead of it managing them)? Buying, implementing, replacing and securing technology are huge challenges

Read More

Nov 30, 2014

15 Tips for Safe Shopping Online

Excerpt: Did you know that cyberthieves also have Black Friday and Cyber Monday sales – of stolen credentials, including IDs, passwords, e-mails,

Read More

Nov 20, 2014

Encryption: Its Time Has Come

Excerpt: In the simplest terms, cryptography is the science of secret communication. It involves transmitting and storing data in a form that

Read More

Sep 12, 2014

The New Mantra in Cybersecurity: Detect and Respond

Excerpt: For years, the emphasis was on preventing villains – cybercriminals, state-sponsored agents, business espionage spies and hackers – out.

Read More

Sep 10, 2014

Finally, a Tablet That Can Replace a Laptop!

Excerpt: Finally, a tablet that can replace a laptop. Much as lawyers love their iPads – and they are great for

Read More