Latest Publications

Share:

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Ransomware Legislation: A Window Into Tomorrow’s Compliance Obligations

A few weeks ago we wrote about the threat that increasingly sophisticated ransomware criminals posed to law firms, and we suggested several measures that law firm leaders might take to minimize the likelihood that they — and...more

Sophisticated Ransomware Criminals Pose Growing Threat to Law Firms

The new year brings with it worrying trends about the rising threat to law firms posed by ever-more sophisticated ransomware attacks.    Cybersecurity firm Skybox Security reported that ransomware criminals are thriving in...more

Exercising Due Diligence in the Selection of a Tech Vendor

The task of conducting due diligence in the selection of technology vendors is a critical component of the lawyer’s ethical obligation to maintain reasonable security over client confidential information. However, for several...more

Staying Secure in the New Hybrid Workplace

Most observers believe that the legal profession is rapidly moving toward so-called “hybrid workplaces,” a term office managers use to describe a mixed-work environment that spans brick-and-mortar law offices, home offices,...more

Revised State Data Breach Laws Demand Attention

I’ve written quite a bit during the past year about cybersecurity, urging lawyers to take seriously their obligations to protect client confidential information and to be judicious when acquiring technology and services that...more

Lawyers, Be Tough Customers When Purchasing Technology

Lawyers, ask yourselves:  Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more

Lawyers Encouraged to Vet Tech Vendors Carefully

Law firms are prime targets for hackers. Why? Because their computer networks contain highly concentrated, high-value information about many parties that is often not well-protected. One often-overlooked vulnerability is the...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide