Articles
To receive new articles by email, you may sign up here.
May 13, 2015
The Basics of Keeping Your Data Secure
Excerpt: Before you can protect your data, you need to know where it is. That seems pretty obvious, but a
Read MoreMay 04, 2015
Why Do Lawyers Resist Ethical Rules Requiring Competence With Technology?
Excerpt: Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were
Read MoreMay 01, 2015
The Scourge of Law Firms: Ransomware That Encrypts Your Data
Excerpt: Remember the good old days of ransomware? You would get an e-mail saying that you owed the IRS money and
Read MoreMar 04, 2015
Is Cloud Computing Inevitable for Lawyers?
Excerpt: Not a single day goes by when you don’t hear something about cloud computing. It could be some new feature or
Read MoreFeb 16, 2015
It’s Easy to Bypass Smartphone Fingerprint Security
Excerpt: Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint
Read MoreFeb 05, 2015
The Internet of Everything: What It Means for Lawyers
Excerpt: What does the Internet of Everything mean for lawyers? Evidence – lots and lots of new sources of evidence. The continuing
Read MoreFeb 02, 2015
Balancing Technology and Re-establishing Real Relationships
Excerpt: Technology has come to rule us all – to varying degrees – and with dire consequences in some cases. We’ve seen
Read MoreJan 05, 2015
How Lawyers Can Manage Their Technology Well
Excerpt: Can lawyers actually manage their technology (instead of it managing them)? Buying, implementing, replacing and securing technology are huge challenges
Read MoreNov 30, 2014
15 Tips for Safe Shopping Online
Excerpt: Did you know that cyberthieves also have Black Friday and Cyber Monday sales – of stolen credentials, including IDs, passwords, e-mails,
Read MoreNov 20, 2014
Encryption: Its Time Has Come
Excerpt: In the simplest terms, cryptography is the science of secret communication. It involves transmitting and storing data in a form that
Read MoreSep 12, 2014
The New Mantra in Cybersecurity: Detect and Respond
Excerpt: For years, the emphasis was on preventing villains – cybercriminals, state-sponsored agents, business espionage spies and hackers – out.
Read MoreSep 10, 2014
Finally, a Tablet That Can Replace a Laptop!
Excerpt: Finally, a tablet that can replace a laptop. Much as lawyers love their iPads – and they are great for
Read More